17 resultados para HLA antigen class 1

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is a technology that enables the non-contact, automatic and unique identification of objects using radio waves. Its use for commercial applications has recently become attractive with RFID technology seen as the replacement for the optical barcode system that is currently in widespread use. RFID has many advantages over the traditional barcode and these advantages have the potential to significantly increase the efficiency of decentralised business environments such as logistics and supply chain management. One of the important features of an RFID system is its ability to search for a particular tag among a group of tags. In order to ensure the privacy and security of the tags, the search has to be conducted in a secure fashion. To our knowledge not much work has been done in this secure search area of RFID. The limited work that has been done does not comply with the EPC Class-1 Gen-2 standards since most of them use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a serverless ultra-lightweight secure search protocol that does not use the expensive hash functions or any complex encryption schemes but achieves compliance with EPC Class-1 Gen-2 standards while meeting the required security requirements. Our protocol is based on XOR encryption and random numbers - operations that are easily implemented on low-cost RFID tags. Our protocol also provides additional protection using a blind-factor to prevent tracking attacks. Since our protocol is EPC Class-1 Gen-2 compliant it makes it possible to implement it on low-cost passive RFID tags.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is a technological revolution that is expected to soon replace barcode systems. One of the important features of an RFID system is its ability to search for a particular tag among a group of tags. This task is quite common where RFID systems play a vital role. To our knowledge not much work has been done in this secure search area of RFID. Also, most of the existing work do not comply with the C1G2 standards. Our work aims to fill that gap by proposing a protocol based on Quadratic Residues property that does not use the expensive hash functions or any complex encryption schemes but achieves total compliance with industry standards while meeting the security requirements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The objective of the research is to develop security protocols for EPC C1G2 RFID Passive Tags in the areas of ownership transfer and grouping proof.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A role for α4 and β7 integrins in mediating leucocyte entry into the central nervous system in the multiple sclerosis (MS)-like disease experimental autoimmune encephalomyelitis (EAE) has been demonstrated. However, the individual contributions of their respective ligands mucosal addressin cell adhesion molecule-1 (MAdCAM-1), vascular cell adhesion molecule-1 (VCAM-1) and E-cadherin expressed on the blood-brain barrier has not been determined. In the present paper, it is shown that an antibody directed against MAdCAM-1, the preferential ligand for α4β7, effectively prevented the development of a progressive, non-remitting, form of EAE, actively induced by injection of myelin oligodendrocyte glycoprotein peptide (MOG(35-55)) autoantigen. Combinational treatment with both anti-MAdCAM-1, VCAM-1, and intercellular adhesion molecule-1 (ICAM-1) (ligand for integrin lymphocyte function-associated antigen (LFA)-1) mAbs led to more rapid remission than that obtained with anti-MAdCAM-1 antibody alone. However, neither MAdCAM-1 monotherapy, nor combinational antibody blockade was preventative when administered late in the course of disease progression. In conclusion, MAdCAM-1 plays a major contributory role in the progression of chronic EAE and is a potential therapeutic target for the treatment of MS. Critically, antivascular addressin therapy must be given eaA role for alpha4 and beta7 integrins in mediating leucocyte entry into the central nervous system in the multiple sclerosis (MS)-like disease experimental autoimmune encephalomyelitis (EAE) has been demonstrated. However, the individual contributions of their respective ligands mucosal addressin cell adhesion molecule-1 (MAdCAM-1), vascular cell adhesion molecule-1 (VCAM-1) and E-cadherin expressed on the blood-brain barrier has not been determined. In the present paper, it is shown that an antibody directed against MAdCAM-1, the preferential ligand for alpha4beta7, effectively prevented the development of a progressive, non-remitting, form of EAE, actively induced by injection of myelin oligodendrocyte glycoprotein peptide (MOG(35-55)) autoantigen. Combinational treatment with both anti-MAdCAM-1, VCAM-1, and intercellular adhesion molecule-1 (ICAM-1) (ligand for integrin lymphocyte function-associated antigen (LFA)-1) mAbs led to more rapid remission than that obtained with anti-MAdCAM-1 antibody alone. However, neither MAdCAM-1 monotherapy, nor combinational antibody blockade was preventative when administered late in the course of disease progression. In conclusion, MAdCAM-1 plays a major contributory role in the progression of chronic EAE and is a potential therapeutic target for the treatment of MS. Critically, antivascular addressin therapy must be given early in the course of disease prior to the establishment of irreversible damage if it is to be effective, as a single treatment modality.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

High impulsivity is common to substance and gambling addictions. Despite these commonalities, there is still substantial heterogeneity on impulsivity levels within these diagnostic groups, and variations in impulsive levels predict higher severity of symptoms and poorer outcomes. We addressed the question of whether impulsivity scores can yield empirically driven subgroups of addicted individuals that will exhibit different clinical presentations and outcomes. We applied latent class analysis (LCA) to trait (UPPS-P impulsive behavior scale) and cognitive impulsivity (Stroop and d2 tests) scores in three predominantly male addiction diagnostic groups: Cocaine with Personality Disorders, Cocaine Non-comorbid, and Gambling and analyzed the usefulness of the resulting subgroups to differentiate personality beliefs and relevant outcomes: Craving, psychosocial adjustment, and quality of life. In accordance with impulsivity scores, the three addiction diagnostic groups are best represented as two separate classes: Class 1 characterized by greater trait impulsivity and poorer cognitive impulsivity performance and Class 2 characterized by lower trait impulsivity and better cognitive impulsivity performance. The two empirically derived classes showed significant differences on personality features and outcome variables (Class 1 exhibited greater personality dysfunction and worse clinical outcomes), whereas conventional diagnostic groups showed non-significant differences on most of these measures. Trait and cognitive impulsivity scores differentiate subgroups of addicted individuals with more versus less severe personality features and clinical outcomes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Buildings have a significant impact on environmental quality, resource use, human health and productivity. One definition of sustainable building is that which meets current building needs and reduces impacts on future generations by integrating building materials and methods that promote environmental quality, economic vitality, and social benefit’ (City of Seattle, 2006). In response to a changing view of
sustainability the Building Code of Australia (BCA) adopted energy measures in 2005 to residential buildings and, in 2006, to Class 1 – 9 buildings. In many respects the measures represented a watershed for the Australian Building Regulations which had not included sustainability within the BCA. The goals of the BCA are to enable the achievement and maintenance of acceptable standards of structural sufficiency, safety (including safety from fire), health and amenity for the benefit of the community now and in the future (ABCB, 2004a). As with any change some Building Surveyors and construction practitioners viewed these measures with apprehension. How would the measures be assessed? Furthermore, was the BCA the appropriate place for these measures and was this a broadening of the scope of the building regulations beyond
its traditional remit of health and life safety in buildings? This research used a questionnaire survey the canvass the views and perceptions of Building Surveyors and Architects with regards to sustainability and the BCA in 2006.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we present a novel approach to authentication and privacy in RFID systems based on the minimum disclosure property and in conformance to EPC Class-1 Gen-2 specifications. We take into account the computational constraints of EPC Class-1 Gen-2 passive RFID tags and only the cyclic redundancy check (CRC) and pseudo random number generator (PRNG) functions that passive RFID tags are capable of are employed. Detailed security analysis of our scheme shows that it can offer robust security properties in terms of tag anonymity and tag untraceability while at the same time being robust to replay, tag impersonation and desynchronisation attacks. Simulations results are also presented to study the scalability of the proposed scheme and its impact on authentication delay.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose a novel secure tag ownership transfer scheme for closed loop RFID systems. An important property of our method is that the ownership transfer is guaranteed to be atomic and the scheme is protected against desynchronisation leading to permanent DoS. Further, it is suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use the CRC and PRNG functions that passive RFID tags are capable of. We provide a detailed security analysis to show that our scheme satisfies the required security properties of tag anonymity, tag location privacy, forward secrecy, forward untraceability while being resistant to replay, desynchronisation and server impersonation attacks. Performance comparisons show that our scheme is practical and can be implemented on passive low-cost RFID tags.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we propose a novel approach to secure ownership transfer in RFID systems based on the quadratic residue property. We present two secure ownership transfer schemes-the closed loop and open loop schemes. An important property of our schemes is that ownership transfer is guaranteed to be atomic. Further, both our schemes are suited to the computational constraints of EPC Class-1 Gen-2 passive RFID tags as they only use operations that such passive RFID tags are capable of. We provide a detailed security analysis to show that our schemes achieve strong privacy and satisfy the required security properties of tag anonymity, tag location privacy, forward secrecy, and forward untraceability. We also show that the schemes are resistant to replay (both passive and algebraic), desynchronization, and server impersonation attacks. Performance comparisons demonstrate that our schemes are practical and can be implemented on low-cost passive RFID tags.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although there are lots of work to provide privacy and anonymity, little focus has been given to ensure confidentiality and integrity of RFID tag data. To this end, we propose a lightweight hybrid approach based on stenographic and watermarking to ensure data confidentiality, linkability resistance and integrity on the RFID tags data. The proposed technique is capable of tampered data recovering and restoring for RFID tag. It has been validated and tested on EPC class 1 gen2 tags.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Also, synchronization of keys, forward security, proving simultaneity, creating dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on Quadratic Residues property where the tags are only required to use XOR, 128-bit Pseudo Random Number Generators (PRNG) and Modulo (MOD) operations which can be easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several grouping proof protocols have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with EPC Class-1 Gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, forward security, dependence, detecting illegitimate tags, eliminating unwanted tag processing and denial-of-proof (DoP) attacks have not been fully addressed by many. Our protocol addresses these important gaps and is based on simple XOR encryption and 128-bit Pseudo Random Number Generators (PRNG), operations that are easily implemented on low-cost passive tags and hence achieves EPC C1G2 compliance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag and multi-owner RFID environment. Most of the existing work in this area do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since they use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill this gap by proposing a protocol based on simple XOR and 128-bit Pseudo Random Number Generators (PRNG), operations that can be easily implemented on low-cost passive RFID tags. The protocol thus achieves EPC C1G2 compliance while meeting the security requirements. Also, our protocol provides additional protection using a blind-factor to prevent tracking attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several grouping proof protocols for RFID systems have been proposed over the years but they are either found to be vulnerable to certain attacks or do not comply with the EPC class-1 gen-2 (C1G2) standard because they use hash functions or other complex encryption schemes. Among other requirements, synchronization of keys, simultaneity, dependence, detecting illegitimate tags, eliminating unwanted tag processing, and denial-of-proof attacks have not been fully addressed by many. Our protocol addresses these important gaps by taking a holistic approach to grouping proofs and provides forward security, which is an open research issue. The protocol is based on simple (XOR) encryption and 128-bit pseudorandom number generators, operations that can be easily implemented on low-cost passive tags. Thus, our protocol enables large-scale implementations and achieves EPC C1G2 compliance while meeting the security requirements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner RFID environment that provides individual-owner-privacy. To our knowledge, the existing schemes do not provide individual-owner-privacy and most of the existing schemes do not comply with the EPC Global Class-1 Gen-2 (C1G2) standard since the protocols use expensive hash operations or sophisticated encryption schemes that cannot be implemented on low-cost passive tags that are highly resource constrained. Our work aims to fill these gaps by proposing a protocol that provides individual-owner-privacy, based on simple XOR and 128-bit pseudo-random number generators (PRNG), operations that are easily implemented on low-cost RFID tags while meeting the necessary security requirements thus making it a viable option for large scale implementations. Our protocol also provides additional protection by hiding the pseudo-random numbers during all transmissions using a blind-factor to prevent tracking attacks.