Powered by Deep Web Technologies
Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

2

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

3

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data  

Broader source: Energy.gov [DOE]

Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

4

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

5

U-084: Cisco Digital Media Manager Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

6

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

7

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

8

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication  

Broader source: Energy.gov [DOE]

A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

9

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass...

10

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories  

Broader source: Energy.gov [DOE]

A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

11

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

12

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

13

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

14

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

15

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges  

Broader source: Energy.gov [DOE]

A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

16

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multipleAuthentication

17

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGainLet

18

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticat...  

Broader source: Energy.gov (indexed) [DOE]

11: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users Access FilesDirectories U-211: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users...

19

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain...

20

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks T-688: McAfee Security Bulletin - McAfee SaaS Endpoint Protection...

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

22

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

23

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

24

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

25

U-137: HP Performance Manager Unspecified Bug Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

26

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

27

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

28

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

29

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

30

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements |

31

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Broader source: Energy.gov (indexed) [DOE]

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

32

T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

719:Apache modproxyajp HTTP Processing Error Lets Remote Users Deny Service T-719:Apache modproxyajp HTTP Processing Error Lets Remote Users Deny Service September 16, 2011 -...

33

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

34

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

35

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files...  

Broader source: Energy.gov (indexed) [DOE]

7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011...

36

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following...

37

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Office of Environmental Management (EM)

URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

38

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service...

39

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 -...

40

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-071:HP Database Archiving Software Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

42

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct...

43

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

44

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Office of Environmental Management (EM)

165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May...

45

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

46

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs...

47

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and...  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain...

48

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

49

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

50

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

51

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

52

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

53

V-010: 3Com, HP, and H3C Switches SNMP Configuration Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

The vendor has issued a fix for some affected products. Addthis Related Articles U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive...

54

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...  

Office of Environmental Management (EM)

Controller Software for Integrated Services Module 300 and Cisco Services-Ready Engine 700, 710, 900, and 910 ABSTRACT: A remote authenticated user can execute arbitrary...

55

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

56

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

57

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discovered aUsers

58

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222:...

59

U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

60

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct...  

Broader source: Energy.gov (indexed) [DOE]

can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID:...

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw  

Broader source: Energy.gov [DOE]

An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

62

U-203: HP Photosmart Bug Lets Remote Users Deny Service  

Broader source: Energy.gov [DOE]

A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

63

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

64

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Broader source: Energy.gov (indexed) [DOE]

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

65

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially...  

Broader source: Energy.gov (indexed) [DOE]

of service. Solution: Pidgin has issued a fix (2.10.0). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

66

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

67

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications...

68

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

remote user can cause the Firefox installer to load a DLL from the default downloads directory and execute arbitrary code. Only Windows-based systems are affected. A remote user...

69

V-218: HP Service Manager Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

A remote user can gain unauthorized access on the target system. IMPACT: User access via network SOLUTION: The vendor has issued a fix. Addthis Related Articles U-010:HP Onboard...

70

T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...  

Broader source: Energy.gov (indexed) [DOE]

Articles U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-174: RSA Authentication Manager Writes Operating System, SNMP,...

71

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

72

Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for  

E-Print Network [OSTI]

University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non≠tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

73

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multiple

74

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

the target user opens a valid Remote Desktop configuration file (.rdp) from the same directory as the DLL file, the application may load the remote user's DLL instead of the...

75

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

76

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

and Change User Passwords U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-173: Symantec Web Gateway Multiple Vulnerabilities...

77

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6...

78

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...  

Energy Savers [EERE]

5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

79

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment of Energy

80

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGain

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department of

82

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code | Department

83

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code|Privileges,

84

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6ScriptingURL Address|Conduct Cross-Site

85

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

86

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

87

U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

88

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

89

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

90

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System  

Broader source: Energy.gov [DOE]

A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

91

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

92

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that,...

93

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to...

94

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

95

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...  

Office of Environmental Management (EM)

next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security...

96

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

97

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

98

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy Savers [EERE]

231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users...

99

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact: A local or remote user can...

100

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Broader source: Energy.gov (indexed) [DOE]

A remote user on the local network with the ability to conduct a man-in-the-middle attack can impersonate the kdump SSH server to potentially access information in vmcore dumps...

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...  

Office of Environmental Management (EM)

This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) attack and e.g. disclose potentially sensitive information. IMPACT: A remote user can spoof...

102

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy Savers [EERE]

Service Pack 1 ABSTRACT: A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS sessions. reference LINKS: Microsoft Security Advisory (2588513)...

103

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory  

Broader source: Energy.gov [DOE]

The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

104

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multipleAuthentication or Obtain

105

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multipleAuthentication orAttacks

106

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote and Local  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThereDepartment ofFlaw LetsUsers

107

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof

108

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:

109

V-235: Cisco Mobility Services Engine Configuration Error Lets...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login...

110

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

111

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can cause the target application to execute arbitrary code on the target user's system.

112

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service  

Broader source: Energy.gov [DOE]

A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

113

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

114

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

115

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages  

Broader source: Energy.gov [DOE]

A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

116

U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

117

U-017: HP MFP Digital Sending Software Lets Local Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

118

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

119

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

120

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Broader source: Energy.gov (indexed) [DOE]

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

122

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

123

V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...  

Broader source: Energy.gov (indexed) [DOE]

6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May...

124

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

125

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

126

Authentication of byte sequences  

SciTech Connect (OSTI)

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

127

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

128

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

129

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

130

U-168: EMC Documentum Information Rights Management Server Bugs...  

Broader source: Energy.gov (indexed) [DOE]

8: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote...

131

Public workstations: Authentication  

E-Print Network [OSTI]

identification. 3. Personal data With registration, library clients and guests accept that their personal dataPublic workstations: Authentication The public workstations require a personal login. This flyer will provide you with information on the procedure for receiving personal login details (authentication

Gilli, Adrian

132

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network [OSTI]

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

133

U-051: Skype Discloses IP Addresses to Remote Users | Department...  

Broader source: Energy.gov (indexed) [DOE]

available at the time of this entry. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

134

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

135

Nanotechnology-Based Trusted Remote Sensing James B. Wendt and Miodrag Potkonjak  

E-Print Network [OSTI]

Nanotechnology-Based Trusted Remote Sensing James B. Wendt and Miodrag Potkonjak Computer Science nanotechnology PPUF-based architecture for trusted remote sensing. Current public physical unclonable function the authentication process. Our novel nanotechnology- based architecture ensures fast authentication through partial

Potkonjak, Miodrag

136

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

137

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: ∑ Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ∑∑∑∑ Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

138

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

keeps track of UDP packets within memory. November 9, 2011 U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication A remote user can bypass...

139

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

keeps track of UDP packets within memory. November 9, 2011 U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication A remote user can bypass...

140

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and  

E-Print Network [OSTI]

Cryptanalysis of an ID≠based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID≠based password authen≠ tication schemes for logging onto a remote network server using smart

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

142

U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

CVE-2012-0307 CVE-2012-0308 CVE-2012-3579 CVE-2012-3580 CVE-2012-3581 IMPACT ASSESSMENT: Medium Discussion: Symantec was notified of several security issues impacting Symantec's...

143

V-220: Juniper Security Threat Response Manager Lets Remote Authentica...  

Broader source: Energy.gov (indexed) [DOE]

commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT: Execution of arbitrary code via network, User...

144

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service...  

Broader source: Energy.gov (indexed) [DOE]

1.2.16 and 1.4.0 to 1.4.6. 1. Largeinfinite loop in the DICOM dissector. (Bug 5876) 2. Red Hat Security Response Team discovered that a corrupted Diameter dictionary file could...

145

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538...

146

T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

service conditions. PLATFORM: Prior to 1.6.1 - Apache Santuario XML Security for C++ library versions prior to V1.6.1 ABSTRACT: A buffer overflow exists when creating or...

147

V-035: Google Chrome Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

read may occur in Skia CVE-2012-5130. A memory corruption error may occur in the Apple OSX driver for Intel GPUs CVE-2012-5131. A browser crash may occur when processing...

148

U-275: HP IBRIX X9000 Storage Discloses Information to Remote...  

Broader source: Energy.gov (indexed) [DOE]

The vendor has issued a fix (6.1.260). Addthis Related Articles V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users U-135: HP WBEM...

149

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

150

IT Licentiate theses Query Authentication and  

E-Print Network [OSTI]

IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

Flener, Pierre

151

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect (OSTI)

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operatorís and the IAEAís interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using ďjoint useĒ equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAís ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

152

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

153

MaximumLetThrough.PDF  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces andMapping the Nanoscale LandscapeImportsBG NorthMauro9 Maximum Let-Through

154

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

155

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere

156

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

157

Let's Move! Enjoy Moving as a Family  

E-Print Network [OSTI]

and employer.This material is partially funded by USDA's Supplemental Nutrition Assistance Program ­ SNAP which by the Expanded Food Nutrition Education Program, USDA, NIFA. Let's Move...Cold Weather Fun! Let's Move, Virginia Polytechnic Institute and State University, 2013 Virginia Cooperative Extension programs

Liskiewicz, Maciej

158

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks Several vulnerabilities were reported in McAfee Email Gateway....

159

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks Several vulnerabilities were reported in McAfee Email Gateway....

160

T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed...  

Broader source: Energy.gov (indexed) [DOE]

available at the time of this entry. Addthis Related Articles U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-130: JBoss Operations...

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

and conduct phishing attacks. Other attacks may also be possible. July 12, 2012 U-211: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users Access Files...

162

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

and conduct phishing attacks. Other attacks may also be possible. July 12, 2012 U-211: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users Access Files...

163

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

by malicious people to bypass certain security restrictions. May 14, 2012 U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users...

164

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

165

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

by malicious people to bypass certain security restrictions. May 14, 2012 U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users...

166

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

167

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6Scripting Attacks |ServiceUsers Deny

168

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING  

E-Print Network [OSTI]

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

Cortesi, Tino

169

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

170

T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send...  

Broader source: Energy.gov (indexed) [DOE]

Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM:...

171

U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am...

172

U-094: EMC Documentum Content Server Lets Local Administrative...  

Broader source: Energy.gov (indexed) [DOE]

4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated...

173

Final report for the network authentication investigation and pilot.  

SciTech Connect (OSTI)

New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

2006-11-01T23:59:59.000Z

174

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudget AdvancedASSESSINGEnergy

175

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

176

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

177

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

178

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

179

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

180

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Solar Decathlon 2013: Let the Building Begin | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Solar Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During...

182

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

183

A SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE  

E-Print Network [OSTI]

. In this paper, we propose to secure an infrastructure providing telecommunication services on the Internet- bile Internet Telecommunication services (MobInTel). We present this infrastructure in detailsA SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE COMMUNICATION SERVICES OVER THE INTERNET Ir

von Bochmann, Gregor

184

Remote Access  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecentRegionalReliabilityScientificNationalRemote

185

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

186

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

187

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

188

A Flexible Approach to Embedded Network Multicast Authentication  

E-Print Network [OSTI]

A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

Koopman, Philip

189

Shouhuai Xu 2000 1 Password-based Authentication and  

E-Print Network [OSTI]

&AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

Sandhu, Ravi

190

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

191

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network [OSTI]

Multi-Level ¬ĶTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level ¬ĶTESLA based on ¬ĶTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level ¬ĶTESLA satisfies several nice

Ning, Peng

192

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16≠32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

193

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect (OSTI)

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

194

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

"qtactivex" parameters within an HTML object. 4) A boundary error when handling the transform attribute of "text3GTrack" elements can be exploited to cause a buffer overflow via...

195

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

An SVG text handling font processing flaw exists CVE-2011-2877. A cross-origin access control flaw exists CVE-2011-2878. Lifetime and threading issues exist in...

196

U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

HTC One Series, Sensation, Sensation XL, and possibly others; Motorola Droids, and Sony Ericsson Xperia series ABSTRACT: A vulnerability was reported in Google Android...

197

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

be confirmed via a browser dialog CVE-2011-2783. A file path may be disclosed in the GL program log CVE-2011-2784. The homepage URL is not sanitized in extensions...

198

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in...

199

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System  

Broader source: Energy.gov [DOE]

PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

200

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

or logical Layer-2 network as the affected system to gain an unauthenticated root shell. REFERENCE LINKS: SecurityTracker Alert ID: 1028682 Secunia Advisory SA53730 Cisco...

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

2.0.12.PatchesSoftware Downloads Update Firefox 3.6.14 Mozilla Downloads SeaMonkey 2.1 Beta 2 Addthis Related Articles T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML...

202

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints...  

Broader source: Energy.gov (indexed) [DOE]

ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT...

203

U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service...  

Broader source: Energy.gov (indexed) [DOE]

Wireshark Bug Database - Bug 7666 SecurityTracker Alert ID: 1027464 Bugtraq ID: 55284 Red Hat Bugzilla - Bug 849926 CVE-2012-3548 IMPACT ASSESSMENT: Medium Discussion: An...

204

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

and 8.2.x are affected when they are configured for any of the following features: * SSL VPNs * Cisco Adaptive Security Device Manager (ASDM) Administrative Access * Telnet...

205

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

issue does not affect Mac OS X systems. Viewing an image in a maliciously prepared directory may lead to arbitrary code execution. A path searching issue exists in QuickTime...

206

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input before displaying the...

207

U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

208

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...  

Office of Environmental Management (EM)

1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

209

T-692: VMware vFabric tc Server Lets Remote Users Login Using...  

Broader source: Energy.gov (indexed) [DOE]

Support & Downloads (2.0.6.RELEASE, 2.1.2.RELEASE). Addthis Related Articles V-013: EMC Avamar Client for VMware Discloses Server Password to Local Users T-575: OpenLDAP...

210

V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il :^ a.7 V

211

V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il3: RedLogin

212

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar Power in the|

213

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & SolarDepartmentArbitrary Code

214

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBM

215

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment of

216

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment of

217

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment

218

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS X update

219

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS X updateAttacks,

220

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS XCode |

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

V-144: HP Printers Let Remote Users Access Files on the Printer |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS XCode |A

222

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS

223

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL i s

224

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL i sAccess

225

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03) OMB Control No.NREL iUsers

226

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Environmental Management (EM)

data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to reload...

227

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and

228

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and|

229

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery AttacksCode |

230

T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multiple | Department| Department

231

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multiple | Department|

232

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multiple | Department|Conduct

233

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multiple | Department|ConductUsers

234

T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof Energy StrainClient update resolve multiple |Department

235

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO * FLASH FLOOD

236

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO * FLASH

237

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO *Arbitrary Code

238

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian updateCommands on

239

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian updateCommands

240

U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian| Department of

242

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||

243

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023:Addresses | Department of

244

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023:Addresses | Department

245

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA documentRed

246

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers Deny Service |

247

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers Deny Service

248

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecute

249

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | DepartmentDepartment

250

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department of EnergyCode |

251

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department of EnergyCode

252

V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks

253

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a commandDepartment

254

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is

255

V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere isAttacks | Department of

256

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThereDepartment

257

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThereDepartmentExecute Arbitrary

258

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

259

V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |

260

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami hasService | Department

262

U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03) OMB Control2:Department42:

263

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03) OMB

264

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03) OMBFirmware with Arbitrary

265

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code |

266

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code| Department

267

U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code|

268

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters and

269

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters andCross-Site

270

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6

271

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6Scripting Attacks | DepartmentBypass

272

U-167: OpenSSL Invalid TLS/DTLS Record Processing Lets Remote Users Deny  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6Scripting Attacks |Service | Department

273

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |

274

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6ScriptingURL Address Bar, Conduct

275

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6ScriptingURL Address

276

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6ScriptingURL Address| DepartmentObtain

277

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6ScriptingURL Address|Conduct

278

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6ScriptingURLDepartment of Energy 7:

279

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6ScriptingURLDepartment of Energy

280

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of|

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

and in the built-in media storage on the BlackBerry smartphone, but not email and other personal information stored on the file system of the BlackBerry smartphone. The following...

282

Nonlinear Adaptive Control of Networked Power Generators with Remote Measurement Units  

E-Print Network [OSTI]

provided by Phasor Measurement Units (PMU). The proposed control system is designed in a robust way illustrate its good behavior, and suggest that the new measurement and data transmission devices can bring Measurement Units (PMU). These devices are far beyond SCADA, and let one envisage the use of real time remote

Paris-Sud XI, Université de

283

LET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY  

E-Print Network [OSTI]

/kWh, depending on its location as well as on the size and type of PV system used (EPIA Report, 2011). InvestmentLET THE SUN SHINE: OPTIMAL DEPLOYMENT OF PHOTOVOLTAICS IN GERMANY Anna CRETI J√©r√īme JOAUG Cahier n:chantal.poujouly@polytechnique.edu hal-00751743,version1-14Nov2012 #12;Let the sun shine: optimal deployment of photovoltaics in Germany

Paris-Sud XI, Université de

284

U-044: HP Operations Agent and Performance Agent Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

4: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted...

285

U-178: VMware vMA Library Loading Error Lets Local Users Gain...  

Broader source: Energy.gov (indexed) [DOE]

Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges...

286

Authenticity and Physiological Changes during Defensive Verbal Response  

E-Print Network [OSTI]

who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how oneís cognitions, physiology, and behavior support or challenge...

Yen, Yana

2013-08-31T23:59:59.000Z

287

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

288

Understanding 'It': Affective Authenticity, Space, and the Phish Scene  

E-Print Network [OSTI]

"Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

Yeager, Elizabeth Anne

2011-04-26T23:59:59.000Z

289

U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets...  

Broader source: Energy.gov (indexed) [DOE]

Lifecycle Attachmate Downloads SecurityTracker Alert ID: 1026340 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Attachmate Reflection. A remote user...

290

Remote Systems Design & Deployment  

SciTech Connect (OSTI)

The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNLís experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNLís work experiences, and the work of others in the national laboratory complex.

Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

2009-08-28T23:59:59.000Z

291

Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.  

E-Print Network [OSTI]

Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w(D)) Pumping Lemma for Regular Sets #12;proof: Let w L(D), |w| n, w = w1, w2, . . . , wn · u w = w1 w2 w3, 2, . . . Pumping Lemma for Regular Sets #12;Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F

Immerman, Neil

292

Remote actuated valve implant  

SciTech Connect (OSTI)

Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

2014-02-25T23:59:59.000Z

293

Remotely Deployed Virtual Sensors  

E-Print Network [OSTI]

Remotely Deployed Virtual Sensors TR-UTEDGE-2007-010 Sanem Kabadayi Christine Julien © Copyright 2007 The University of Texas at Austin #12;Remotely Deployed Virtual Sensors Sanem Kabadayi that run on mobile client devices connect to the sensors of a multihop sensor network. For emerging

Julien, Christine

294

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices  

E-Print Network [OSTI]

to achieve explicit key confirmation. We also point out Wu's scheme decreases efficiency by using the double by the traditional public-key cryptography (Rivest et al., 1978; ElGama, l985). The computation ability and battery the number of users is increased, KAC needs a large storage space to store users' public keys

295

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department of

296

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discoveredSUSE

297

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network [OSTI]

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

298

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

299

Advanced Calculus 2 1. The derivative: Let Rm  

E-Print Network [OSTI]

, . . . , m). (9) We assume the transformation (9) to be invertible, that is, we can for the xj as functionsAdvanced Calculus 2 1. The derivative: Let Rm have components j and x: Rm Rn by x() = x1 matrix. You can think of A as a linear function taking Rm to Rm . We denote by AB the image of B under A

Logan, David

300

Authentic, Dialogic Writing: Th e Case of a Letter to the Editor  

E-Print Network [OSTI]

A teacher educator reflects on the educational value of an authentic writing assignment inspired by real-world local events.

Hallman, Heidi L.

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris äkori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

302

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

303

The order of encryption and authentication for protecting communications (Or: how secure is SSL?)  

E-Print Network [OSTI]

The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

304

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

, or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

305

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

306

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Broader source: Energy.gov (indexed) [DOE]

SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

307

Thermal Infrared Remote Sensing  

E-Print Network [OSTI]

Thermal Infrared Remote Sensing Thermal Infrared Remote Sensing #12;0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4 and x-ray Ultraviolet Infrared Microwave and radio waves Wavelength in meters (m) Electromagnetic.77 700 red limit 30k0.041 2.48 green500 near-infrared far infrared ultraviolet Thermal Infrare refers

308

Remote electrochemical sensor  

DOE Patents [OSTI]

An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

Wang, Joseph (Las Cruces, NM); Olsen, Khris (Richland, WA); Larson, David (Las Cruces, NM)

1997-01-01T23:59:59.000Z

309

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

310

ELmE : A Misuse Resistant Parallel Authenticated Encryption  

E-Print Network [OSTI]

-Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

311

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

312

Forging Attacks on two Authenticated Encryptions COBRA and POET  

E-Print Network [OSTI]

Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

313

Authenticated Streamwise On-line Encryption Patrick P. Tsang  

E-Print Network [OSTI]

and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

314

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees  

E-Print Network [OSTI]

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

Gummadi, Ramakrishna

315

Cryptanalysis of a recent two factor authentication scheme  

E-Print Network [OSTI]

Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

316

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

317

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

318

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

319

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

320

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

T-671: Red Hat system-config-firewall Lets Local Users Gain Root...  

Broader source: Energy.gov (indexed) [DOE]

1: Red Hat system-config-firewall Lets Local Users Gain Root Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges July 19, 2011 - 2:42pm Addthis...

322

T-721:Mac OS X Directory Services Lets Local Users View User...  

Broader source: Energy.gov (indexed) [DOE]

1:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am...

323

Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA.  

E-Print Network [OSTI]

Pumping Lemma for Regular Sets: Let D = (Q, , , q0, F) be a DFA. Let n = |Q|. Let w L(D) s.t. |w: Pumping Lemma CS250: Discrete Math for Computer Science #12;proof: Let w L(D), |w| n, w = w1, w2 F Thus, xykz L(D) for k = 0, 1, 2, . . . L30: Pumping Lemma CS250: Discrete Math for Computer

Massachusetts at Amherst, University of

324

Remote radiation dosimetry  

DOE Patents [OSTI]

Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

1991-03-12T23:59:59.000Z

325

Remote connector development study  

SciTech Connect (OSTI)

Plutonium-uranium extraction (PUREX) connectors, the most common connectors used at the Hanford site, offer a certain level of flexibility in pipe routing, process system configuration, and remote equipment/instrument replacement. However, these desirable features have inherent shortcomings like leakage, high pressure drop through the right angle bends, and a limited range of available pipe diameters that can be connect by them. Costs for construction, maintenance, and operation of PUREX connectors seem to be very high. The PUREX connector designs include a 90{degree} bend in each connector. This increases the pressure drop and erosion effects. Thus, each jumper requires at least two 90{degree} bends. PUREX connectors have not been practically used beyond 100 (4 in.) inner diameter. This study represents the results of a survey on the use of remote pipe-connection systems in US and foreign plants. This study also describes the interdependence between connectors, remote handling equipment, and the necessary skills of the operators.

Parazin, R.J.

1995-05-01T23:59:59.000Z

326

Remote electrochemical sensor  

DOE Patents [OSTI]

An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

Wang, J.; Olsen, K.; Larson, D.

1997-10-14T23:59:59.000Z

327

Remote Sensor Placement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemoteSpectrum andRemote

328

Threshold LET for SEU induced by low energy ions  

SciTech Connect (OSTI)

Simulations to determine the threshold LET as a function of the length of the ion track are consistent with there being two regions of charge collection. In the top layer which contains the depletion region all the charge generated is collected in time to upset the device. In the next layer, 10% to 20% of the charge generated is collected and contributes to upsetting the device. This second layer of partial charge collection may significantly impact the accuracy of SEU predictions involving low-energy neutrons and protons. A simple method of including this contribution in calculations is proposed.

McNulty, P.J.; Roche, P.; Palau, J.M.; Gasiot, J.

1999-12-01T23:59:59.000Z

329

Solar Decathlon 2015: Let the Competition Begin | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSite CulturalDepartment ofat HomeAssurance:Designing theMeet5: Let

330

Vacuum Vessel Remote Handling  

E-Print Network [OSTI]

and Remote Handling 4 Vacuum vessel functions · Plasma vacuum environment · Primary tritium confinement, incl ports 65 tonnes - Weight of torus shielding 100 tonnes · Coolant - Normal Operation Water, Handling 12 Vessel octant subassembly fab. (3) · Octant-to-octant splice joint requires double wall weld

331

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

332

Provably Secure Password-based Authentication in TLS  

SciTech Connect (OSTI)

In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

2005-12-20T23:59:59.000Z

333

1. Jordan Lemma Let R0 be a positive number and a a real number with |a| < R0. Let  

E-Print Network [OSTI]

= R -(R) (R) e-mR sin f(Rei ) d R max z R |f(z)| -(R) (R) e-mR sin d R max z R |f(z)| 0 e-mR sin d = 2R max z R |f(z)| 2 0 e-mR sin d. Now we use the following simple lemma. 1.2. Lemma. Let [0 e- 2mR 2 0 = 2mR 1 - e-mR 2mR . Combining this with the above we get R eimz f(z) dz m max z

Milicic, Dragan

334

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

335

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

336

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

337

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

soft- ware can certify particular outputs. Software Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 9 A Local Authentication...

338

Remote Sensing Laboratory - RSL  

SciTech Connect (OSTI)

One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

None

2014-11-06T23:59:59.000Z

339

Remote Sensing Laboratory - RSL  

ScienceCinema (OSTI)

One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

None

2015-01-09T23:59:59.000Z

340

Remote switch actuator  

DOE Patents [OSTI]

The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

2013-01-29T23:59:59.000Z

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Remote repair appliance  

DOE Patents [OSTI]

A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

1997-12-16T23:59:59.000Z

342

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information  

Broader source: Energy.gov [DOE]

An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

343

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03) OMB Control2: AppleSessions

344

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyTheDepartment of1: Oracle Java MultipleDepartment

345

U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)

346

U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage ¬Ľof EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code | Department of

347

ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing  

E-Print Network [OSTI]

such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

348

Final report and recommendations of the ESnet Authentication Pilot Project  

SciTech Connect (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

349

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

350

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

351

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

352

Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang  

E-Print Network [OSTI]

Breaking POET Authentication with a Single Query Jian Guo, J¬īer¬īemy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

353

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

354

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

Basin, David

355

SSL/TLS Session-Aware User Authentication Rolf Oppliger1  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

Basin, David

356

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

(International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

357

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach  

E-Print Network [OSTI]

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

358

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme  

E-Print Network [OSTI]

, Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

359

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

360

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Xu, Wenyuan

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

362

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network [OSTI]

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

363

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

364

REMOTE AND RURAL ENTERPRISE (RARE)  

E-Print Network [OSTI]

in remote central Australia is establishing a commercial aquaponics enterprise, a social entrepreneur, hospitality and horticulture. The current focus is on a commercial aquaponics enterprise and a cultural

Viglas, Anastasios

365

Software Design 2 (Arduino Nano) BodyBody--RemotesRemotes  

E-Print Network [OSTI]

Software Design 2 (Arduino Nano) BodyBody--RemotesRemotes Gesture Based Appliance Control System the room Large wireless range, e.g. 100 m range with 1mW XBees Safely separate the Arduino from input ways to lower cost further Switch to Arduino Mini Light Develop our own wireless modules Jacob

Spletzer, John R.

366

Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.  

SciTech Connect (OSTI)

Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

Boonin, David Magnus

2009-11-15T23:59:59.000Z

367

Remotely operated pipe connector  

DOE Patents [OSTI]

An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

Josefiak, Leonard J. (Scotia, NY); Cramer, Charles E. (Guilderford, NY)

1988-01-01T23:59:59.000Z

368

Space and Remote Sensing (ISR-2)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 Space and Remote Sensing Developing and applying remote sensing capabilities to problems of global security and related sciences Contacts Group Leader Robert Shirey Email Deputy...

369

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

, it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

370

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

371

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network [OSTI]

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

Otey, Penny Addison

2011-10-21T23:59:59.000Z

372

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

373

Remote direct memory access  

DOE Patents [OSTI]

Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

Archer, Charles J.; Blocksome, Michael A.

2012-12-11T23:59:59.000Z

374

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

375

THE C*-ALGEBRA OF A VECTOR BUNDLE 1. Introduction Let E ...  

E-Print Network [OSTI]

Jul 19, 2010 ... If B/J is nuclear then it is C(X)-nuclear and since CJ is KKX-contractible it follows that Ķ must be a KKX-equivalence, see [2]. Let us recall that†...

2010-07-19T23:59:59.000Z

376

Genomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1  

E-Print Network [OSTI]

Genomic instability and bystander effects induced by high-LET radiation Eric J Hall*,1 and Tom K. There is a progressive increase in genomic instability, determined either by gene amplification or allelic imbalance

377

Anonymous, authentic, and accountable resource management based on the E-cash paradigm  

E-Print Network [OSTI]

AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

Lam, Tak Cheung

2009-05-15T23:59:59.000Z

378

Let A be any language. Define the right-equivalence relation A on  

E-Print Network [OSTI]

= {a, b}; A1 = w #b(w) 0 (mod 2) L34: Myhill-Nerode Theorem CS250: Discrete Math for Computer Science #12;x A y w (xw A yw A) Let = {a, b}; A1 = w #b(w) 0 (mod 2) A1 a b A1 ab L34: Myhill-Nerode Theorem CS250: Discrete Math for Computer Science #12;x A y w (xw A yw A) Let = {a, b}; A1 = w #b

Massachusetts at Amherst, University of

379

Remote drill bit loader  

SciTech Connect (OSTI)

A drill bit loader is described for loading a tapered shank of a drill bit into a similarly tapered recess in the end of a drill spindle. The spindle has a transverse slot at the inner end of the recess. The end of the tapered shank of the drill bit has a transverse tang adapted to engage in the slot so that the drill bit will be rotated by the spindle. The loader is in the form of a cylinder adapted to receive the drill bit with the shank projecting out of the outer end of the cylinder. Retainer pins prevent rotation of the drill bit in the cylinder. The spindle is lowered to extend the shank of the drill bit into the recess in the spindle and the spindle is rotated to align the slot in the spindle with the tang on the shank. A spring unit in the cylinder is compressed by the drill bit during its entry into the recess of the spindle and resiliently drives the tang into the slot in the spindle when the tang and slot are aligned. In typical remote drilling operations, whether in hot cells or water pits, drill bits have been held using a collet or end mill type holder with set screws. In either case, to load or change a drill bit required the use master-slave manipulators to position the bits and tighten the collet or set screws. This requirement eliminated many otherwise useful work areas because they were not equipped with slaves, particularly in water pits.

Dokos, J.A.

1996-12-31T23:59:59.000Z

380

Electromagnetic Radiation REFERENCE: Remote Sensing of  

E-Print Network [OSTI]

1 CHAPTER 2: Electromagnetic Radiation Principles REFERENCE: Remote Sensing of the Environment John;2 Electromagnetic Energy Interactions Energy recorded by remote sensing systems undergoes fundamental interactions, creating convectional currents in the atmosphere. c) Electromagnetic energy in the form of electromagnetic

Gilbes, Fernando

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: Debian SecurityBypass

382

10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Sensing  

E-Print Network [OSTI]

10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Book ReviewBook Review High Performance Computing in Remote Sensing introduces the most recent advances in the incorporation of the high-performance computing (HPC) paradigm in remote sensing missions. Eighteen well

Plaza, Antonio J.

383

Connecting Remote Clusters with ATM  

SciTech Connect (OSTI)

Sandia's entry into utilizing clusters of networked workstations is called Computational Plant or CPlant for short. The design of CPlant uses Ethernet to boot the individual nodes, Myrinet to communicate within a node cluster, and ATM to connect between remote clusters. This SAND document covers the work done to enable the use of ATM on the CPlant nodes in the Fall of 1997.

Hu, T.C.; Wyckoff, P.S.

1998-10-01T23:59:59.000Z

384

The Remote Media Immersion (RMI)  

E-Print Network [OSTI]

the ultimate digital media delivery platform. Its streaming media server delivers multiple high- bandwidth aspects). The hope is that our advances in digital media delivery will enable new applicationsThe Remote Media Immersion (RMI) system blends multiple cutting- edge media technologies to create

Shahabi, Cyrus

385

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

386

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)  

E-Print Network [OSTI]

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Z®urich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

Basin, David

387

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network [OSTI]

A Tree-Based ¬ĶTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. ¬ĶTESLA and multi-level ¬ĶTESLA have been proposed to provide of senders. Though multi-level ¬ĶTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

388

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network [OSTI]

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

389

Device Lets Monkey's Brain Move Robot Arm Research could one day aid amputees or paralysis victims  

E-Print Network [OSTI]

Device Lets Monkey's Brain Move Robot Arm Research could one day aid amputees or paralysis victims successfully wired monkey brains to robot arms, raising hope that science is moving closer to finding ways to help paralyzed people control their world. Using their brains to control their robot arms, monkeys

Schwartz, Andrew

390

Adriano Galati Christian Olms Jonathan Haber Kasia Warpas ... let it rain  

E-Print Network [OSTI]

Adriano Galati Christian Olms Jonathan Haber Kasia Warpas ... let it rain Tuesday, 12 July 2011 #12@cs.nott.ac.uk christian.olms@stud.uni-due.de jonhaber@gmail.com kasia.warpas@gmail.com Tuesday, 12 July 2011 #12;

Subramanian, Sriram

391

International Journal of Robotics Research, In Press Let Them Fall Where They May  

E-Print Network [OSTI]

International Journal of Robotics Research, In Press Let Them Fall Where They May: Capture Regions is considered which has useful application in automatic robot planning and the design of parts feeders. When resting aspects (Boothroyd, Redford, Poli & Murch 1972)) is useful for many tasks in robotic

Jaffe, Jules

392

Which research in design creativity and innovation? Let us not forget the reality of companies  

E-Print Network [OSTI]

1 Which research in design creativity and innovation? Let us not forget the reality of companies Bernard Yannou Professor of Design & Industrial Engineering Laboratoire Genie Industriel Ecole Centrale design creativity and innovation from practical perspectives for companies requires both a good

Paris-Sud XI, Université de

393

Energy Policy 33 (2005) 18251832 Letting the (energy) Gini out of the bottle: Lorenz curves of  

E-Print Network [OSTI]

Energy Policy 33 (2005) 1825­1832 Letting the (energy) Gini out of the bottle: Lorenz curves of cumulative electricity consumption and Gini coefficients as metrics of energy distribution and equity Arne Jacobsona , Anita D. Milmana , Daniel M. Kammena,b, * a Energy and Resources Group, University of California

Kammen, Daniel M.

394

WE INVEST IN TECHNOLOGY. NOW LET US INVEST IN YOU. Leap Technology Program  

E-Print Network [OSTI]

WE INVEST IN TECHNOLOGY. NOW LET US INVEST IN YOU. Leap Technology Program Fidelity Investments innovation, and effective deployment of leading-edge technologies. Our entry-level technology training, Quality Assurance, Mainframe Development and Technology Infrastructure and Engineering (TIE). Upon

Virginia Tech

395

Let the Experts Guide the Use of Simulation Software Georg Reichard1  

E-Print Network [OSTI]

for easy preparation and presentation of integrated help screens, guiding users through the use1 INSTRUCTOR Let the Experts Guide the Use of Simulation Software Georg Reichard1 , Adil Al-Mumin2 curve by understanding the impact of decisions made during the input/design process. Keywords. Software

396

Disposable remote zero headspace extractor  

DOE Patents [OSTI]

The remote zero headspace extractor uses a sampling container inside a stainless steel vessel to perform toxicity characteristics leaching procedure to analyze volatile organic compounds. The system uses an in line filter for ease of replacement. This eliminates cleaning and disassembly of the extractor. All connections are made with quick connect fittings which can be easily replaced. After use, the bag can be removed and disposed of, and a new sampling container is inserted for the next extraction.

Hand, Julie J. (Idaho Falls, ID); Roberts, Mark P. (Arco, ID)

2006-03-21T23:59:59.000Z

397

Experience with Remote Job Execution  

SciTech Connect (OSTI)

The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Green, Mark L [ORNL; Kohl, James Arthur [ORNL; Miller, Stephen D [ORNL; Ren, Shelly [ORNL; Smith, Bradford C [ORNL; Vazhkudai, Sudharshan S [ORNL

2008-01-01T23:59:59.000Z

398

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

399

A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots  

E-Print Network [OSTI]

of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

Paris-Sud XI, Universitť de

400

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

Basin, David

402

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication  

E-Print Network [OSTI]

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

Yang, Junfeng

403

Simplified authenticated key exchange based on the q(th) root problem  

SciTech Connect (OSTI)

Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

JOHNSTON,ANNA M.; GEMMELL,PETER S.

2000-02-29T23:59:59.000Z

404

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards  

E-Print Network [OSTI]

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

Paris-Sud XI, Université de

405

Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for  

E-Print Network [OSTI]

to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

Hazas, Mike

406

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

407

U-155: WebCalendar Access Control and File Inclusion Bugs Let...  

Broader source: Energy.gov (indexed) [DOE]

were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966...

408

T-624: Novell eDirectory LDAP-SSL Memory Allocation Error Lets...  

Broader source: Energy.gov (indexed) [DOE]

the target service to crash. On Netware-based systems, the system may crash. PLATFORM: Red Hat Enterprise, SuSE,AIX, HPUX, Solaris, Windows 2000, 2003 ABSTRACT: A remote user...

409

Remote imaging of concealed objects  

SciTech Connect (OSTI)

Optical detection of objects hidden behind opaque screening layers is a challenging problem. We demonstrate an optically detected echographic-like method that combines collimated acoustic and laser beams. The acoustic waves cross the screening layers and their back-reflection from the hidden objects is detected through the analysis of a dynamic laser speckle pattern created at the outer surface of the screening layer. Real-time remote detection of moving targets 15 meters away, with a few mm resolutions is demonstrated using a very sensitive camera detection scheme.

Lev, Aner, E-mail: lev@soreq.gov.il; Sfez, Bruno, E-mail: lev@soreq.gov.il [Soreq NRC, Yavne, 81800 (Israel)

2014-05-27T23:59:59.000Z

410

Remote Access | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote Access Ames

411

Remote Desktop | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote Access

412

Remote Sensing R. E. Mcintosh  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote

413

Remote Sens. 2013, 5, 1484-1497; doi:10.3390/rs5031484 Remote Sensing  

E-Print Network [OSTI]

Remote Sens. 2013, 5, 1484-1497; doi:10.3390/rs5031484 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal and the Community Land Model version 4 (CLM4), we investigated percent changes and controlling factors of global vegetation growth for the period 1982 to 2009. Over that 28-year period, both the remote-sensing estimate

Myneni, Ranga B.

414

Remote Sens. 2013, 5, 2857-2882; doi:10.3390/rs5062857 Remote Sensing  

E-Print Network [OSTI]

Remote Sens. 2013, 5, 2857-2882; doi:10.3390/rs5062857 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Evaluation of CLM4 Solar Radiation Partitioning Scheme Using Remote Sensing and Site Level FPAR.e., that of the Community Land Model version 4 (CLM4) with coupled carbon and nitrogen cycles. Taking advantage of a unique

Myneni, Ranga B.

415

CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of  

E-Print Network [OSTI]

- and middle-infrared regions, water bodies appear very dark even black becausebodies appear very dark, even and pure and contains little suspended sediment or organic matter. Water Penetration Cozumel Island1 CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of WaterWaterWaterWater REFERENCE: Remote

Gilbes, Fernando

416

Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing  

E-Print Network [OSTI]

Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing ISSN 2072-4292 www for a geosynchronous OPEN ACCESS #12;Remote Sens. 2013, 5 5174 satellite with modern imaging detectors, software, and algorithms able to detect heat from early and small fires, and yield minute-scale detection times. Keywords

Stephens, Scott L.

417

Remote Sens. 2013, 5, 5969-5998; doi:10.3390/rs5115969 Remote Sensing  

E-Print Network [OSTI]

Remote Sens. 2013, 5, 5969-5998; doi:10.3390/rs5115969 Remote Sensing ISSN 2072-4292 www, the technique presented in this paper would help them to quantify the impacts of OPEN ACCESS #12;Remote Sens; urban heat island effect; NDVI; artificial neural network; Markov chain; Dhaka 1. Introduction Urban

Crawford, Ian

418

Stochastic modeling of the cell killing effect for low- and high-LET radiation  

E-Print Network [OSTI]

the cell nucleus; and insiders, secondary particles initiated and stopping inside the cell nucleus............................................................................25 FIG. 8. Lineal energy distribution for a spherical tissue region of one... LET, or lineal energy (its microscopic equivalent) is usually used to describe the energy deposition within a site of interest. The lineal energy, y, is the energy deposited per unit length, and is defined as the quotient of ? by l , where...

Partouche, Julien

2005-02-17T23:59:59.000Z

419

Remotely readable fiber optic compass  

DOE Patents [OSTI]

A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

Migliori, Albert (Santa Fe, NM); Swift, Gregory W. (Los Alamos, NM); Garrett, Steven L. (Pebble Beach, CA)

1986-01-01T23:59:59.000Z

420

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Equitable Access: Remote and Rural Communities 'Transport Needs...  

Open Energy Info (EERE)

Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

422

availiable remote sensing: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Remote SensingThermal Infrared Remote Sensing Thermal infrared) and thermal infrared energy (3.0 - 14 m). However, thermal infrared sensors allow humans to sense 2 Thermal...

423

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect (OSTI)

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

424

Integrating end-to-end encryption and authentication technology into broadband networks  

SciTech Connect (OSTI)

BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

Pierson, L.G.

1995-11-01T23:59:59.000Z

425

T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

427

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Office of Environmental Management (EM)

reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSLTLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4...

428

Summary of meeting on disposal of LET&D HEPA filters  

SciTech Connect (OSTI)

This report is a compilation of correspondence between Westinghouse Idaho Nuclear Company and the US EPA over a period of time from 1988 to 1992 (most from 1991-92) regarding waste management compliance with EPA regulations. Typical subjects include: compliance with satellite accumulation requirements; usage of ``Sure Shot`` containers in place of aerosol cans; notice of upcoming recyclable battery shipments; disposition of batteries; HEPA filter leach sampling and permit impacts; functional and operation requirements for the spent filter handling system; summary of meeting on disposal of LET and D HEPA filters; solvent substitution database report; and mercury vapor light analytical testing.

Not Available

1991-11-21T23:59:59.000Z

429

Let's Keep Talking: Women in STEM Tweet Up | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel2007 |KSRS25RV*)Boyd About Us Lauren BoydTheLessonsLet's Keep

430

Heating remote rooms in passive solar buildings  

SciTech Connect (OSTI)

Remote rooms can be effectively heated by convection through a connecting doorway. A simple steady-state equation is developed for design purposes. Validation of a dynamic model is achieved using data obtained over a 13-day period. Dynamic effects are investigated using a simulation analysis for three different cases of driving temperature; the effect is to reduce the temperature difference between the driving room and the remote room compared to the steady-state model. For large temperature swings in the driving room a strategy which uses the intervening door in a diode mode is effective. The importance of heat-storing mass in the remote room is investigated.

Balcomb, J.D.

1981-01-01T23:59:59.000Z

431

On-road remote sensing of vehicle emissions in  

E-Print Network [OSTI]

On-road remote sensing of vehicle emissions in the Auckland Region August 2003 Technical 1877353000 www.arc.govt.nz #12;TP 198 On-Road Remote Sensing of Vehicle Emissions in the Auckland Region #12;Page i TP 198 On-Road Remote Sensing of Vehicle Emissions in the Auckland Region On-road remote sensing

Denver, University of

432

Remote-handled transuranic system assessment appendices. Volume 2  

SciTech Connect (OSTI)

Volume 2 of this report contains six appendices to the report: Inventory and generation of remote-handled transuranic waste; Remote-handled transuranic waste site storage; Characterization of remote-handled transuranic waste; RH-TRU waste treatment alternatives system analysis; Packaging and transportation study; and Remote-handled transuranic waste disposal alternatives.

NONE

1995-11-01T23:59:59.000Z

433

applied remote sensing: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Thermal Infrared Remote Sensing Thermal Infrared Remote Sensing 12;0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4 Infrared Remote SensingThermal Infrared Remote SensingThermal Infrared...

434

"Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors  

E-Print Network [OSTI]

"Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors Remote sensing requires that a sensor be constructed and then attached to a platform that provides an aerial view of the landscape. "Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors Remote sensing requires that a sensor

Frank, Thomas D.

435

The development and application of the Remotely Monitored Sealing Array (RMSA).  

SciTech Connect (OSTI)

Advanced sealing technologies are often an integral part of a containment surveillance (CS) approach to detect undeclared diversion of nuclear materials. As adversarial capabilities continue to advance, the sophistication of the seal design must advance as well. The intelligent integration of security concepts into a physical technology used to seal monitored items is a fundamental requirement for secure containment. Seals have a broad range of capabilities. These capabilities must be matched appropriately to the application to establish the greatest effectiveness from the seal. However, many current seal designs and their application fail to provide the high confidence of detection and timely notification that can be appreciated with new technology. Additionally, as monitoring needs rapidly expand, out-pacing budgets, remote monitoring of low-cost autonomous sealing technologies becomes increasingly appealing. The Remotely Monitored Sealing Array (RMSA) utilizes this technology and has implemented cost effective security concepts establishing the high confidence that is expected of active sealing technology today. RMSA is a system of relatively low-cost but secure active loop seals for the monitoring of nuclear material containers. The sealing mechanism is a fiber optic loop that is pulsed using a low-power LED circuit with a coded signal to verify integrity. Battery life is conserved by the use of sophisticated power management techniques, permitting many years of reliable operation without battery replacement or other maintenance. Individual seals communicate by radio using a secure transmission protocol using either of two specially designated communication frequency bands. Signals are encrypted and authenticated by private key, established during the installation procedure, and the seal bodies feature both active and passive tamper indication. Seals broadcast to a central 'translator' from which information is both stored locally and/or transmitted remotely for review. The system is especially appropriate for nuclear material storage facilities, indoor or outdoor, enabling remote inspection of status rather than tedious individual seal verification, and without the need for interconnected cabling. A handheld seal verifier is also available for an inspector to verify any particular individual seal in close proximity. This paper will discuss the development of the RMSA sealing system, its capabilities, its application philosophy, and projected future trends.

Schoeneman, Barry Dale; Stein, Marius (Canberra, USA); Wishard, B. (International Atomic Energy Agency, Austria)

2010-09-01T23:59:59.000Z

436

Remote Sensing of Soils, Minerals, and Geomorphology  

E-Print Network [OSTI]

,Remote Sensing of Soils, Minerals, and GeomorphologyMinerals, and Geomorphology · Soil is unconsolidated material). ·· SoilSoil is unconsolidated material at the surface of the Earth thatis unconsolidated material

437

Fiber optically isolated and remotely stabilized data transmission system  

DOE Patents [OSTI]

A fiber optically isolated and remotely stabilized data transmission systems described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber. 3 figs.

Nelson, M.A.

1992-11-10T23:59:59.000Z

438

2007 Urban Remote Sensing Joint Event Application of satellite Remote Sensing for Urban  

E-Print Network [OSTI]

2007 Urban Remote Sensing Joint Event Application of satellite Remote Sensing for Urban Risk Analysis: a case study of the 2003 extreme heat wave in Paris Bénédicte Dousset Hawaii Institute@ogs.trieste.it Abstract ­ Satellite observations are used to monitor the August 2003 heat wave in Paris

Paris-Sud XI, Université de

439

Low power reactor for remote applications  

SciTech Connect (OSTI)

A compact, low power reactor is being designed to provide electric power for remote, unattended applications. Because of the high fuel and maintenance costs for conventional power sources such as diesel generators, a reactor power supply appears especially attractive for remote and inaccessible locations. Operating at a thermal power level of 135 kWt, the power supply achieves a gross electrical output of 25 kWe from an organic Rankine cycle (ORC) engine. By intentional selection of design features stressing inherent safety, operation in an unattended mode is possible with minimal risk to the environment. Reliability is achieved through the use of components representing existing, proven technology. Low enrichment uranium particle fuel, in graphite core blocks, cooled by heat pipes coupled to an ORC converter insures long-term, virtually maintenance free, operation of this reactor for remote applications. 10 refs., 7 figs., 3 tabs.

Meier, K.L.; Palmer, R.G.; Kirchner, W.L.

1985-01-01T23:59:59.000Z

440

Photovoltaic applications for remote-island needs  

SciTech Connect (OSTI)

Electric power supply options available to many of the central and south Pacific island governments are severely constrained by remoteness, limited infrastructures, a corrosive natural environment, and the high delivered costs of many conventional energy sources. Photovoltaic energy systems offer a currently available, practical, and cost-effective source of electricity for many stand-alone applications in remote areas of the Pacific. Photovoltaic system definitions and cost analyses are provided for selected applications in the Republic of Palau, the Federated States of Micronesia, the Republic of the Marshall Islands, and the Territory of American Samoa.

Schaller, D.A.

1983-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Valve assembly having remotely replaceable bearings  

DOE Patents [OSTI]

A valve assembly having remotely replaceable bearings is disclosed wherein a valve disc is supported within a flow duct for rotation about a pair of axially aligned bearings, one of which is carried by a spindle received within a diametral bore in the valve disc, and the other of which is carried by a bearing support block releasably mounted on the duct circumferentially of an annular collar on the valve disc coaxial with its diametrical bore. The spindle and bearing support block are adapted for remote removal to facilitate servicing or replacement of the valve disc support bearings.

Johnson, Evan R. (San Diego, CA); Tanner, David E. (Poway, CA)

1980-01-01T23:59:59.000Z

442

Remote/New sites: Many Field  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemoteSpectrumRemote/New

443

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & SolarDepartment ofRemote Users

444

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBM

445

978-1-4799-1270-4/13/$31.00 c 2013 IEEE Let's ChronoSync: Decentralized Dataset State  

E-Print Network [OSTI]

978-1-4799-1270-4/13/$31.00 c 2013 IEEE Let's ChronoSync: Decentralized Dataset State of knowledge about the dataset such as text messages, changes to the shared folder, or document edits. We to efficiently synchronize the state of a dataset among a distributed group of users. Using appropriate naming

California at Los Angeles, University of

446

Resume of definitions of "tangent vector" Let M be a manifold, m M, and X = (X1  

E-Print Network [OSTI]

Resum¬īe of definitions of "tangent vector" Let M be a manifold, m M, and X = (X1 , ¬∑ ¬∑ ¬∑Xd ) : U Joel Feldman. 2008. All rights reserved. September 30, 2008 Resum¬īe of definitions of "tangent vector rights reserved. September 30, 2008 Resum¬īe of definitions of "tangent vector" 2 #12;

Feldman, Joel

447

EAST TEXAS FOREST INVENTORY (ETFI) PILOT PROJECT REMOTE SENSING PHASE  

E-Print Network [OSTI]

EAST TEXAS FOREST INVENTORY (ETFI) PILOT PROJECT REMOTE SENSING PHASE Dr. Daniel R. Unger, Remote) or the United States Forest Service (USFS) via the Southern Forest Inventory and Analysis Program (SFIA

Hung, I-Kuai

448

Remote sensing of terrestrial tropospheric aerosols from aircraft and satellites  

E-Print Network [OSTI]

Remote sensing of terrestrial tropospheric aerosols from aircraft and satellites M I Mishchenko1 instruments suitable for aerosol remote sensing and give examples of aerosol retrievals obtained forcing directly by absorbing and reflecting sunlight, thereby cooling or heating the atmosphere

449

Remote Sensing for Biodiversity Conservation of the Albertine Rift  

E-Print Network [OSTI]

183 10 Remote Sensing for Biodiversity Conservation of the Albertine Rift in Eastern Africa Samuel of biodiversity conservation is understanding how environmental factors influence species abundance 2003). The rapidly developing field of remote sensing has been invaluable to biodiversity conservation

Wang, Y.Q. "Yeqiao"

450

Geothermal Exploration Using Aviris Remote Sensing Data Over...  

Open Energy Info (EERE)

Aviris Remote Sensing Data Over Fish Lake Valley, Nv Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Geothermal Exploration Using Aviris Remote...

451

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

452

E-Print Network 3.0 - aerospace remote sensing Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

within aerospace engineering Astrodynamics Remote... dynamics and control Aerodynamics Remote sensing Computational fluid dynamics Systems engineering... to explore the...

453

Partial Solutions for Assignment 1 (1) In a certain random experiment, let A and B be two events such that P(A) = 0.7,  

E-Print Network [OSTI]

of the slots in which the ball falls. (a) The sample space S = {1, 2, ∑ ∑ ∑, 35, 36, 0, 00}. (b) Let B = {0, 00) A box contains four marbles numbered 1 through 4. The marbles are selected one at a time without replacement. A match occurs if marble numbered k is the kth marble selected. Let the event Ai, denote a match

Chen, Chaur-Chin

454

REFERENCE: Introduction to Remote Sensing. James B.  

E-Print Network [OSTI]

Temperature #12;ACTIVE REMOTE SENSING The sensor illuminates the terrain with its own energy, then records the reflected energy as it has been altered by the earth's surface. #12;SIDE-LOOKING AIRBORNE RADAR SLAR #12 JUAN VENICE #12;EARTH TOPOGRAPHY USING MULTISPECTRAL SCANNERS MT. PINATUBO MT. EVEREST #12;APPLICATIONS

Gilbes, Fernando

455

A Modular Control System for Remote Subsea Eric Stephen Smith  

E-Print Network [OSTI]

A Modular Control System for Remote Subsea Equipment by Eric Stephen Smith Bachelor of Science the undersigned committee hereby approve the attached thesis A Modular Control System for Remote Subsea Equipment and Environmental Systems #12;iv Abstract Title: A Modular Control System for Remote Subsea Equipment Author: Eric

Wood, Stephen L.

456

Training program requirements for remote equipment operators in nuclear facilities  

SciTech Connect (OSTI)

One of the most neglected areas in the engineering development of remotely operated equipment applications in nuclear environments is the planning of adequate training programs for the equipment operators. Remote equipment accidents cannot be prevented solely by engineered safety features on the equipment. As a result of the experiences in using remote equipment in the recovery effort at Three Mile Island Unit 2 (TMI-2), guidelines for the development of remote equipment operator training programs have been generated. The result is that a successful education and training program can create an environment favorable to the safe and effective implementation of a remote equipment program in a nuclear facility.

Palau, G.L.; Auclair, K.D.

1986-01-01T23:59:59.000Z

457

Math 603 Problem Set #5 Due Mon., Feb. 28, 2005 1. a) Let V be an affine variety, with ring of functions R. Let W be a Zariski closed  

E-Print Network [OSTI]

]. Justify your assertions. 4. Given a commutative ring R, define the maximal spectrum of R (denoted Max R) to be the set of maximal ideals of R. For each subset E R, let V (E) denote the set {m Max R | E m} Max R. a) Show that Max R has a topology in which the closed sets are precisely the sets V (E). b) Show that V (E

Harbater, David

458

Lack of Bystander Effects From High LET Radiation For Early Cytogenetic Endpoints.  

SciTech Connect (OSTI)

The aim of this work was to study radiation-induced bystander effects for early cytogenetic end points in various cell lines using the medium transfer technique after exposure to high- and low-LET radiation. Cells were exposed to 20 MeV/ nucleon nitrogen ions, 968 MeV/nucleon iron ions, or 575 MeV/nucleon iron ions followed by transfer of the conditioned medium from the irradiated cells to unirradiated test cells. The effects studied included DNA double-strand break induction, {gamma}-H2AX focus formation, induction of chromatid breaks in prematurely condensed chromosomes, and micronucleus formation using DNA repair-proficient and -deficient hamster and human cell lines (xrs6, V79, SW48, MO59K and MO59J). Cell survival was also measured in SW48 bystander cells using X rays. Although it was occasionally possible to detect an increase in chromatid break levels using nitrogen ions and to see a higher number of {gamma}-H2AX foci using nitrogen and iron ions in xrs6 bystander cells in single experiments, the results were not reproducible. After we pooled all the data, we could not verify a significant bystander effect for any of these end points. Also, we did not detect a significant bystander effect for DSB induction or micronucleus formation in these cell lines or for clonogenic survival in SW48 cells. The data suggest that DNA damage and cytogenetic changes are not induced in bystander cells. In contrast, data in the literature show pronounced bystander effects in a variety of cell lines, including clonogenic survival in SW48 cells and induction of chromatid breaks and micronuclei in hamster cells. To reconcile these conflicting data, it is possible that the epigenetic status of the specific cell line or the precise culture conditions and medium supplements, such as serum, may be critical for inducing bystander effects.

Groesser, Torsten; Cooper, Brian; Rydberg, Bjorn

2008-05-07T23:59:59.000Z

459

Self-referencing remote optical probe  

DOE Patents [OSTI]

A probe for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables.

O'Rourke, Patrick E. (157 Greenwood Dr., Martinez, GA 30907); Prather, William S. (2419 Dickey Rd., Augusta, GA 30906); Livingston, Ronald R. (137 Breckenridge Dr., N. Augusta, GA)

1991-01-01T23:59:59.000Z

460

Self-referencing remote optical probe  

DOE Patents [OSTI]

A probe is described for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables. 3 figures.

O'Rourke, P.E.; Prather, W.S.; Livingston, R.R.

1991-08-13T23:59:59.000Z

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Techniques for remotely sensing watershed runoff potential  

E-Print Network [OSTI]

Techniques for Remotely Sensing Watershed Runoff Potential. (August 1978) Jerry Don Walker, B. S. , Texas ASM University Directed by: Dr. Bruce J. Blanchard The Soil Conservation Service runoff equation is widely used for predicting the watershed runoff... cases, no outflow occurs through the spillway of an overdes1gned structure. Since evaporation losses are high 1n these areas, the salinity of the water stored in the structure gradually increases with time. With insufficient flow through...

Walker, Jerry Don

1978-01-01T23:59:59.000Z

462

Remote Sensing Techniques | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to: navigation, searchVirginia Blue Ridge And PiedmontReminderville, Ohio: EnergyRemote

463

Remotely deployable aerial inspection using tactile sensors  

SciTech Connect (OSTI)

For structural monitoring applications, the use of remotely deployable Non-Destructive Evaluation (NDE) inspection platforms offer many advantages, including improved accessibility, greater safety and reduced cost, when compared to traditional manual inspection techniques. The use of such platforms, previously reported by researchers at the University Strathclyde facilitates the potential for rapid scanning of large areas and volumes in hazardous locations. A common problem for both manual and remote deployment approaches lies in the intrinsic stand-off and surface coupling issues of typical NDE probes. The associated complications of these requirements are obviously significantly exacerbated when considering aerial based remote inspection and deployment, resulting in simple visual techniques being the preferred sensor payload. Researchers at Bristol Robotics Laboratory have developed biomimetic tactile sensors modelled on the facial whiskers (vibrissae) of animals such as rats and mice, with the latest sensors actively sweeping their tips across the surface in a back and forth motion. The current work reports on the design and performance of an aerial inspection platform and the suitability of tactile whisking sensors to aerial based surface monitoring applications.

MacLeod, C. N.; Cao, J.; Pierce, S. G.; Dobie, G.; Summan, R. [Centre for Ultrasonic Engineering, University of Strathclyde, Glasgow, G1 1XW (United Kingdom); Sullivan, J. C.; Pipe, A. G. [Bristol Robotics Laboratory, University of the West of England, Bristol, BS16 1QY (United Kingdom)

2014-02-18T23:59:59.000Z

465

Depth absorbed dose and LET distributions of therapeutic {sup 1}H, {sup 4}He, {sup 7}Li, and {sup 12}C beams  

SciTech Connect (OSTI)

The depth absorbed dose and LET (linear energy transfer) distribution of different ions of clinical interest such as {sup 1}H, {sup 4}He, {sup 7}Li, and {sup 12}C ions have been investigated using the Monte Carlo code SHIELD-HIT. The energies of the projectiles correspond to ranges in water and soft tissue of approximately 260 mm. The depth dose distributions of the primary particles and their secondaries have been calculated and separated with regard to their low and high LET components. A LET value below 10 eV/nm can generally be regarded as low LET and sparsely ionizing like electrons and photons. The high LET region may be assumed to start at 20 eV/nm where on average two double-strand breaks can be formed when crossing the periphery of a nucleosome, even though strictly speaking the LET limits are not sharp and ought to vary with the charge and mass of the ion. At the Bragg peak of a monoenergetic high energy proton beam, less than 3% of the total absorbed dose is comprised of high LET components above 20 eV/nm. The high LET contribution to the total absorbed dose in the Bragg peak is significantly larger with increasing ion charge as a natural result of higher stopping power and lower range straggling. The fact that the range straggling and multiple scattering are reduced by half from hydrogen to helium increases the possibility to accurately deposit only the high LET component in the tumor with negligible dose to organs at risk. Therefore, the lateral penumbra is significantly improved and the higher dose gradients of {sup 7}Li and {sup 12}C ions both longitudinally and laterally will be of major advantage in biological optimized radiation therapy. With increasing charge of the ion, the high LET absorbed dose in the beam entrance and the plateau regions where healthy normal tissues are generally located is also increased. The dose distribution of the high LET components in the {sup 7}Li beam is only located around the Bragg peak, characterized by a Gaussian-type distribution. Furthermore, the secondary particles produced by high energy {sup 7}Li ions in tissuelike media have mainly low LET character both in front of and beyond the Bragg peak.

Kempe, Johanna; Gudowska, Irena; Brahme, Anders [Division of Medical Radiation Physics, Department of Oncology-Pathology, Karolinska Institutet and Stockholm University, Box 260, SE-171 76 Stockholm (Sweden)

2007-01-15T23:59:59.000Z

466

MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION  

SciTech Connect (OSTI)

We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

J.LESIE REDPATH, PH.D.

2011-03-29T23:59:59.000Z

467

WBS-FOR CREATING AN ER-MODEL Let A(Ei) = the set of attributes of entity-set an Ei.  

E-Print Network [OSTI]

WBS-FOR CREATING AN ER-MODEL ∑ Let A(Ei) = the set of attributes of entity-set an Ei. ∑ Let A from each Ei partici- pating in Rj, can interact multiple times, then we need a pri- mary key among FOR CREATING ER-MODELS Identify name and A(Ei) for each Ei Identify a primary key for each Ei Identify name

Kundu, Sukhamay

468

JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

boundary layer and will provide invaluable ground truth for satellite and aircraft remote sensor measurements. Analyses from these two UAS tropical cyclone missions will be...

469

Method of determining forest production from remotely sensed forest parameters  

DOE Patents [OSTI]

A method of determining forest production entirely from remotely sensed data in which remotely sensed multispectral scanner (MSS) data on forest 5 composition is combined with remotely sensed radar imaging data on forest stand biophysical parameters to provide a measure of forest production. A high correlation has been found to exist between the remotely sensed radar imaging data and on site measurements of biophysical 10 parameters such as stand height, diameter at breast height, total tree height, mean area per tree, and timber stand volume.

Corey, J.C.; Mackey, H.E. Jr.

1987-08-31T23:59:59.000Z

470

Use Remote Sensing Data (selected visible and infrared spectrums...  

Broader source: Energy.gov (indexed) [DOE]

Use Remote Sensing Data (selected visible and infrared spectrums) to locate high temperature ground anomalies in Colorado. Confirm heat flow potential with on-site surveys to drill...

471

Alternative Carriers For Remote Renewable Energy Sources Using...  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal Article: Alternative Carriers For Remote Renewable Energy Sources Using Existing Cng Infrastructure...

472

161 rue Ada F -34392 Montpellier Cedex 05 Tl : 33 (0)4 67 4 85 85 Fax : 33 (0)4 67 4 85 00 www. lirmm.fr Added Redundancy Explicit Authentication at  

E-Print Network [OSTI]

hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication

Boyer, Edmond

473

Remote controlled vacuum joint closure mechanism  

DOE Patents [OSTI]

A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange and maintain the high vacuum seal established by the displacement of the flange assembly and extension of the bellows without displacing the entire duct.

Doll, D.W.; Hager, E.R.

1984-02-22T23:59:59.000Z

474

An advanced unmanned vehicle for remote applications  

SciTech Connect (OSTI)

An autonomous mobile robotic capability is critical to developing remote work applications for hazardous environments. A few potential applications include humanitarian demining and ordnance neutralization, extraterrestrial science exploration, and hazardous waste cleanup. The ability of the remote platform to sense and maneuver within its environment is a basic technology requirement which is currently lacking. This enabling technology will open the door for force multiplication and cost effective solutions to remote operations. The ultimate goal of this work is to develop a mobile robotic platform that can identify and avoid local obstacles as it traverses from its current location to a specified destination. This goal directed autonomous navigation scheme uses the Global Positioning System (GPS) to identify the robot`s current coordinates in space and neural network processing of LADAR range images for local obstacle detection and avoidance. The initial year funding provided by this LDRD project has developed a small exterior mobile robotic development platform and a fieldable version of Sandia`s Scannerless Range Imager (SRI) system. The robotic testbed platform is based on the Surveillance And Reconnaissance ground Equipment (SARGE) robotic vehicle design recently developed for the US DoD. Contingent upon follow-on funding, future enhancements will develop neural network processing of the range map data to traverse unstructured exterior terrain while avoiding obstacles. The SRI will provide real-time range images to a neural network for autonomous guidance. Neural network processing of the range map data will allow real-time operation on a Pentium based embedded processor board.

Pletta, J.B.; Sackos, J.

1998-03-01T23:59:59.000Z

475

Remote vacuum compaction of compressible hazardous waste  

DOE Patents [OSTI]

A system for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut.

Coyne, Martin J. (Pittsburgh, PA); Fiscus, Gregory M. (McMurray, PA); Sammel, Alfred G. (Pittsburgh, PA)

1998-01-01T23:59:59.000Z

476

REMOTE AREA RADIATION MONITORING (RARM) ALTERNATIVES ANALYSIS  

SciTech Connect (OSTI)

The Remote Area Radiation Monitoring (RARM) system will be used to provide real-time radiation monitoring information to the operations personnel during tank retrieval and transfer operations. The primary focus of the system is to detect potential anomalous (waste leaks) or transient radiological conditions. This system will provide mobile, real-time radiological monitoring, data logging, and status at pre-selected strategic points along the waste transfer route during tank retrieval operations. The system will provide early detection and response capabilities for the Retrieval and Closure Operations organization and Radiological Control personnel.

NELSON RL

2008-07-18T23:59:59.000Z

477

Remote vacuum compaction of compressible hazardous waste  

DOE Patents [OSTI]

A system is described for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut. 8 figs.

Coyne, M.J.; Fiscus, G.M.; Sammel, A.G.

1998-10-06T23:59:59.000Z

478

High aspect ratio, remote controlled pumping assembly  

DOE Patents [OSTI]

A miniature dual syringe-type pump assembly is described which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor. 4 figs.

Brown, S.B.; Milanovich, F.P.

1995-11-14T23:59:59.000Z

479

Aerosol Remote Sealing System - Energy Innovation Portal  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the BuildingInnovation 2011 Simulation StudiesAerosol Remote Sealing

480

Securing Remote Desktop for Windows XP http://www.mobydisk.com/./techres/securing_remote_desktop.html  

E-Print Network [OSTI]

an account lockout policy #12;There are already tools that will use brute-force to guess passwords and log-on remotely. You cannot stop this, but it can be minimized by setting an account lockout policy. If someone system. From the same Local Security Policy screen from before, go to Account Policies - Account Lockout

Major, Arkady

Note: This page contains sample records for the topic "lets remote authenticated" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

ImageCat, Inc. Remote Sensing for PostRemote Sensing for Post--disasterdisaster  

E-Print Network [OSTI]

to Salt Lake City SAR simulation The way forward #12;ImageCat, Inc. The IdeaThe Idea Remote sensing and non-damaged structures #12;ImageCat, Inc. Application to Salt Lake CityApplication to Salt Lake City 0 AssessmentBridge Damage Assessment Beverley J. Adams Ph.D. Charles K. Huyck Sungbin Cho Ronald T. Eguchi

Shinozuka, Masanobu

482

Remote control for anode-cathode adjustment  

DOE Patents [OSTI]

An apparatus for remotely adjusting the anode-cathode gap in a pulse power machine has an electric motor located within a hollow cathode inside the vacuum chamber of the pulse power machine. Input information for controlling the motor for adjusting the anode-cathode gap is fed into the apparatus using optical waveguides. The motor, controlled by the input information, drives a worm gear that moves a cathode tip. When the motor drives in one rotational direction, the cathode is moved toward the anode and the size of the anode-cathode gap is diminished. When the motor drives in the other direction, the cathode is moved away from the anode and the size of the anode-cathode gap is increased. The motor is powered by batteries housed in the hollow cathode. The batteries may be rechargeable, and they may be recharged by a photovoltaic cell in combination with an optical waveguide that receives recharging energy from outside the hollow cathode. Alternatively, the anode-cathode gap can be remotely adjusted by a manually-turned handle connected to mechanical linkage which is connected to a jack assembly. The jack assembly converts rotational motion of the handle and mechanical linkage to linear motion of the cathode moving toward or away from the anode.

Roose, Lars D. (Albuquerque, NM)

1991-01-01T23:59:59.000Z

483

System and method for controlling remote devices  

DOE Patents [OSTI]

A system and method for controlling remote devices utilizing a radio frequency identification (RFID) tag device having a control circuit adapted to render the tag device, and associated objects, permanently inoperable in response to radio-frequency control signals. The control circuit is configured to receive the control signals that can include an enable signal, and in response thereto enable an associated object, such as a weapon; and in response to a disable signal, to disable the tag itself, or, if desired, to disable the associated weapon or both the device and the weapon. Permanent disabling of the tag can be accomplished by several methods, including, but not limited to, fusing a fusable link, breaking an electrically conductive path, permanently altering the modulation or backscattering characteristics of the antenna circuit, and permanently erasing an associated memory. In this manner, tags in the possession of unauthorized employees can be remotely disabled, and weapons lost on a battlefield can be easily tracked and enabled or disabled automatically or at will.

Carrender, Curtis Lee (Richland, WA); Gilbert, Ronald W. (Benton City, WA); Scott, Jeff W. (Pasco, WA); Clark, David A. (Kennewick, WA)

2006-02-07T23:59:59.000Z

484

Magnetically vectored nanocapsules for tumor penetration and remotely switchable on-demand drug release  

E-Print Network [OSTI]

a demonstration of remote heating as a function of applied55 Figure 27. Remote magnetic field heating of fluid (water)Figure 27. Remote magnetic field heating of fluid (water)

Kong, Seong Deok

2010-01-01T23:59:59.000Z

485

Analysis of Remote Diagnosis Architecture for a PLCBbased Automated Assembly System  

E-Print Network [OSTI]

: remote diagnosis architecture, nature of failure, skill level of the local operator and level of expertise of the remote troubleshooter. For this purpose, three hierarchical levels of remote diagnosis architectures to diagnose failures in a PLC based...

Sekar, Ramnath

2011-10-21T23:59:59.000Z

486

Real-time Remote Sensing of Snowmobiles Emissions at  

E-Print Network [OSTI]

Real-time Remote Sensing of Snowmobiles Emissions at Yellowstone National Park: An Oxygenated Fuel 68509 #12;Real-time Remote Sensing of Snowmobile Emissions at Yellowstone National Park 2 Executive emissions from snowmobiles. Ratios of CO, HC and toluene to CO2 were measured and used to calculate %CO, %HC

Denver, University of

487

Mobile and remote inertial sensing with atom interferometers  

E-Print Network [OSTI]

Mobile and remote inertial sensing with atom interferometers B. Barrett, P.-A. Gominet, E. Cantin for equivalence principle tests. We also discuss fu- ture applications of this technology, such as remote sensing on laser-cooling and trapping neutral atoms [6, 7, 8, 9, 10] which eventually led to two nobel prizes

Boyer, Edmond

488

Conceptual design analyses for Hanford Site deployable remote spectroscopy systems  

SciTech Connect (OSTI)

This document identifies potential remote, NIR spectroscopic waste surface moisture monitoring system design alternatives to be operated inside one of the Hanford Site, high level, nuclear waste storage tanks. Potential tank waste moisture data impacts from the remote NIR signal transfer through high humidity vapor space is evaluated.

Philipp, B.L.; Reich, F.R.

1994-09-01T23:59:59.000Z

489

Virtual Remote Center of Motion Control for Needle Placement Robots  

E-Print Network [OSTI]

mechanical design but also the need for calibration and registration of the robot to the medical imager priorVirtual Remote Center of Motion Control for Needle Placement Robots Emad M. Boctor, Robert J@jhu.edu, GaborF@jhu.edu http://cisstweb.cs.jhu.edu Abstract. Surgical robots, including those with remote center

Boyer, Edmond

490

TECHNICAL PAPER Multispecies remote sensing measurements of vehicle emissions  

E-Print Network [OSTI]

measurements. The remote sensing mean gram per kilogram carbon monoxide (CO), hydrocarbon (HC), and oxideTECHNICAL PAPER Multispecies remote sensing measurements of vehicle emissions on Sherman Way in Van Department of Chemistry and Biochemistry, University of Denver, Denver, CO, USA 2 National Renewable Energy

Denver, University of

491

Remote estimation of carbon dioxide uptake by a Mediterranean forest  

E-Print Network [OSTI]

to assessing the global carbon budget in a context of climate change (Ciais et al., 2005; Boisvenue & RunningRemote estimation of carbon dioxide uptake by a Mediterranean forest M A R T I¬ī N F. G A R B U L of the ecology of global change. Current remote sensing methodologies for estimating gross primary productivity

Garbulsky, Martín

492

Remote multi-color excitation using femtosecond propagating surface  

E-Print Network [OSTI]

Remote multi-color excitation using femtosecond propagating surface plasmon polaritons in gold away from a micrometer sized focused laser spot. We attribute the observed remote nonlinear signal of unwanted heating effects at the target site and represents an attractive approach for surface

Potma, Eric Olaf

493

Cloud vertical distribution from radiosonde, remote sensing, and model simulations  

E-Print Network [OSTI]

Cloud vertical distribution from radiosonde, remote sensing, and model simulations Jinqiang Zhang's radiation budget and atmospheric adiabatic heating. Yet it is among the most difficult quantities to observe Great Plains and along with ground- based and space-borne remote sensing products, use it to evaluate

Li, Zhanqing

494

Ris-R-1336(EN) Fundamentals for Remote Structural  

E-Print Network [OSTI]

RisÝ-R-1336(EN) Fundamentals for Remote Structural Health Monitoring of Wind Turbine Blades) Fundamentals for Remote Structural Health Monitoring of Wind Turbine Blades - a Preproject Bent F. SÝrensen for the sensors capability to detect the most important damage types in wind turbine blades. Three different

495

Ris-R-1340(EN) Fundamentals for Remote Structural  

E-Print Network [OSTI]

RisÝ-R-1340(EN) Fundamentals for Remote Structural Health Monitoring of Wind Turbine Blades ≠ a Preproject Annex A ≠ Cost-Benefit for Embedded Sensors in Large Wind Turbine Blades Lars Gottlieb Hansen for Remote Structural Health Monitoring of Wind Turbine Blades - a Preproject Annex A - Cost

496

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

497

E-Print Network 3.0 - adaptive remote-sensing techniques Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 3 4 5 > >> 1 10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Sensing Summary: power. Part Two describes a compendium of...

498

E-Print Network 3.0 - automated remote environmental Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Collection: Engineering 38 Energy-saving through remote control of a wastewater treatment plant Summary: . Keywords: Activated sludge process, Internet systems, Remote...

499

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Broader source: Energy.gov (indexed) [DOE]

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

500

Theorem: L : Z List. ( p :{Z Z | let m, i = p in max_seg_sum(m; L) max_initseg_sum(i; L)}) L:Z List. (p:{Z Z| let m,i = p in max_seg_sum(m;L) max_initseg_sum(i;L)})  

E-Print Network [OSTI]

(u;u + p2) initseg_sum(r;[u; u1 / v]) )) 2 #12;Theorem: L : Z List. ( p :{Z √? Z | let m, i = p in maxTheorem: L : Z List. ( p :{Z √? Z | let m, i = p in max_seg_sum(m; L) max_initseg_sum(i; L)}) L:Z List. (p:{Z √? Z| let m,i = p in max_seg_sum(m;L) max_initseg_sum(i;L)}) | BY (D 0 THENA Auto) | 1. L