81 resultados para Key Recovery Attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maintaining metadata consistency is a critical issue in designing a filesystem. Although satisfactory solutions are available for filesystems residing on magnetic disks, these solutions may not give adequate performance for filesystems residing on flash devices. Prabhakaran et al. have designed a metadata consistency mechanism specifically for flash chips, called Transactional Flash1]. It uses cyclic commit mechanism to provide transactional abstractions. Although significant improvement over usual journaling techniques, this mechanism has certain drawbacks such as complex protocol and necessity to read whole flash during recovery, which slows down recovery process. In this paper we propose addition of thin journaling layer on top of Transactional Flash to simplify the protocol and speed up the recovery process. The simplified protocol named Quick Recovery Cyclic Commit (QRCC) uses journal stored on NOR flash for recovery. Our evaluations on actual raw flash card show that journal writes add negligible penalty compared to original Transactional Flash's write performance, while quick recovery is facilitated by journal in case of failures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A pairwise independent network (PIN) model consists of pairwise secret keys (SKs) distributed among m terminals. The goal is to generate, through public communication among the terminals, a group SK that is information-theoretically secure from an eavesdropper. In this paper, we study the Harary graph PIN model, which has useful fault-tolerant properties. We derive the exact SK capacity for a regular Harary graph PIN model. Lower and upper bounds on the fault-tolerant SK capacity of the Harary graph PIN model are also derived.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Instrumented microindentation (IM) on two Ni-Ti shape memory alloys (SMAs), where one is austenitic and the other is martensitic at room temperature, were conducted from 40 to 150 degrees C. Results show that the depth and work recovery ratios, eta(d) and eta(w) respectively, are complementary to each other. While eta(d) decreases gradually with temperature for austenite, it drops markedly for the martensite in the martensite-to-austenite transformation regime. These results affirm the utility of IM for characterizing SMAs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A joint analysis-synthesis framework is developed for the compressive sensing (CS) recovery of speech signals. The signal is assumed to be sparse in the residual domain with the linear prediction filter used as the sparse transformation. Importantly this transform is not known apriori, since estimating the predictor filter requires the knowledge of the signal. Two prediction filters, one comb filter for pitch and another all pole formant filter are needed to induce maximum sparsity. An iterative method is proposed for the estimation of both the prediction filters and the signal itself. Formant prediction filter is used as the synthesis transform, while the pitch filter is used to model the periodicity in the residual excitation signal, in the analysis mode. Significant improvement in the LLR measure is seen over the previously reported formant filter estimation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: We highlight an unrecognized physiological role for the Greek key motif, an evolutionarily conserved super-secondary structural topology of the beta gamma-crystallins. These proteins constitute the bulk of the human eye lens, packed at very high concentrations in a compact, globular, short-range order, generating transparency. Congenital cataract (affecting 400,000 newborns yearly worldwide), associated with 54 mutations in beta gamma-crystallins, occurs in two major phenotypes nuclear cataract, which blocks the central visual axis, hampering the development of the growing eye and demanding earliest intervention, and the milder peripheral progressive cataract where surgery can wait. In order to understand this phenotypic dichotomy at the molecular level, we have studied the structural and aggregation features of representative mutations. Methods: Wild type and several representative mutant proteins were cloned, expressed and purified and their secondary and tertiary structural details, as well as structural stability, were compared in solution, using spectroscopy. Their tendencies to aggregate in vitro and in cellulo were also compared. In addition, we analyzed their structural differences by molecular modeling in silico. Results: Based on their properties, mutants are seen to fall into two classes. Mutants A36P, L45PL54P, R140X, and G165fs display lowered solubility and structural stability, expose several buried residues to the surface, aggregate in vitro and in cellulo, and disturb/distort the Greek key motif. And they are associated with nuclear cataract. In contrast, mutants P24T and R77S, associated with peripheral cataract, behave quite similar to the wild type molecule, and do not affect the Greek key topology. Conclusion: When a mutation distorts even one of the four Greek key motifs, the protein readily self-aggregates and precipitates, consistent with the phenotype of nuclear cataract, while mutations not affecting the motif display `native state aggregation', leading to peripheral cataract, thus offering a protein structural rationale for the cataract phenotypic dichotomy ``distort motif, lose central vision''.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we have proposed a novel certificate-less on-demand public key management (CLPKM) protocol for self-organized MANETs. The protocol works on flat network architecture, and distinguishes between authentication layer and routing layer of the network. We put an upper limit on the length of verification route and use the end-to-end trust value of a route to evaluate its strength. The end-to-end trust value is used by the protocol to select the most trusted verification route for accomplishing public key verification. Also, the protocol uses MAC function instead of RSA certificates to perform public key verification. By doing this, the protocol saves considerable computation power, bandwidth and storage space. The saved storage space is utilized by the protocol to keep a number of pre-established routes in the network nodes, which helps in reducing the average verification delay of the protocol. Analysis and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Diaminopropionate ammonialyase (DAPAL), a fold-typeII pyridoxal 5-phosphate-dependent enzyme, catalyzes the ,-elimination of diaminopropionate (DAP) to pyruvate and ammonia. DAPAL was able to utilize both d- and l-DAP as substrates with almost equal efficiency. Mutational analysis of functionally important residues such as Thr385, Asp125 and Asp194 was carried out to understand the mechanism by which the isomers are hydrolyzed. Further, the putative residues involved in the formation of disulfide bond Cys271 and Cys299 were also mutated. T385S, T385D sDAPAL were as active with dl-DAP as substrate as sDAPAL, whereas the later exhibited a threefold increase in catalytic efficiency with d-Ser as substrate. Further analysis of these mutants suggested that DAPAL might follow an anti-E-2 mechanism of catalysis that does not involve the formation of a quinonoid intermediate. Of the two mutants of Asp125, D125E showed complete loss of activity with d-DAP as substrate, whereas the reaction with l-DAP was not affected significantly, demonstrating that Asp125 was essential for abstraction of protons from the d-isomer. By contrast, mutational analysis of Asp194 showed that the residue may not be directly involved in proton abstraction from l-DAP. sDAPAL does not form a disulfide bond in solution, although the position of Cys299 and Cys271 in the modeled structure of sDAPAL favored the formation of a disulfide bond. Further, unlike eDAPAL, sDAPAL could be activated by monovalent cations. Mutation of the cysteine residues showed that Cys271 may be involved in coordinating the monovalent cation, as observed in the case of other fold-typeII enzymes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile nodes observing correlated data communicate using an insecure bidirectional switch to generate a secret key, which must remain concealed from the switch. We are interested in fault-tolerant secret key rates, i.e., the rates of secret key generated even if a subset of nodes drop out before the completion of the communication protocol. We formulate a new notion of fault-tolerant secret key capacity, and present an upper bound on it. This upper bound is shown to be tight when the random variables corresponding to the observations of nodes are exchangeable. Further, it is shown that one round of interaction achieves the fault-tolerant secret key capacity in this case. The upper bound is also tight for the case of a pairwise independent network model consisting of a complete graph, and can be attained by a noninteractive protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tight fusion frames which form optimal packings in Grassmannian manifolds are of interest in signal processing and communication applications. In this paper, we study optimal packings and fusion frames having a specific structure for use in block sparse recovery problems. The paper starts with a sufficient condition for a set of subspaces to be an optimal packing. Further, a method of using optimal Grassmannian frames to construct tight fusion frames which form optimal packings is given. Then, we derive a lower bound on the block coherence of dictionaries used in block sparse recovery. From this result, we conclude that the Grassmannian fusion frames considered in this paper are optimal from the block coherence point of view. (C) 2013 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two atmospheric inversions (one fine-resolved and one process-discriminating) and a process-based model for land surface exchanges are brought together to analyse the variations of methane emissions from 1990 to 2009. A focus is put on the role of natural wetlands and on the years 2000-2006, a period of stable atmospheric concentrations. From 1990 to 2000, the top-down and bottom-up visions agree on the time-phasing of global total and wetland emission anomalies. The process-discriminating inversion indicates that wetlands dominate the time-variability of methane emissions (90% of the total variability). The contribution of tropical wetlands to the anomalies is found to be large, especially during the post-Pinatubo years (global negative anomalies with minima between -41 and -19 Tg yr(-1) in 1992) and during the alternate 1997-1998 El-Nino/1998-1999 La-Nina (maximal anomalies in tropical regions between +16 and +22 Tg yr(-1) for the inversions and anomalies due to tropical wetlands between +12 and +17 Tg yr(-1) for the process-based model). Between 2000 and 2006, during the stagnation of methane concentrations in the atmosphere, the top-down and bottom-up approaches agree on the fact that South America is the main region contributing to anomalies in natural wetland emissions, but they disagree on the sign and magnitude of the flux trend in the Amazon basin. A negative trend (-3.9 +/- 1.3 Tg yr(-1)) is inferred by the process-discriminating inversion whereas a positive trend (+1.3 +/- 0.3 Tg yr(-1)) is found by the process model. Although processed-based models have their own caveats and may not take into account all processes, the positive trend found by the B-U approach is considered more likely because it is a robust feature of the process-based model, consistent with analysed precipitations and the satellite-derived extent of inundated areas. On the contrary, the surface-data based inversions lack constraints for South America. This result suggests the need for a re-interpretation of the large increase found in anthropogenic methane inventories after 2000.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The sparse recovery methods utilize the l(p)-normbased regularization in the estimation problem with 0 <= p <= 1. These methods have a better utility when the number of independent measurements are limited in nature, which is a typical case for diffuse optical tomographic image reconstruction problem. These sparse recovery methods, along with an approximation to utilize the l(0)-norm, have been deployed for the reconstruction of diffuse optical images. Their performancewas compared systematically using both numerical and gelatin phantom cases to show that these methods hold promise in improving the reconstructed image quality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Insulin like growth factor binding protein 4 (IGFBP4) regulates growth and development of tissues and organs by negatively regulating IGF signaling. Among most cancers, IGFBP4 has growth inhibitory role and reported as a down-regulated gene, except for renal cell carcinoma, wherein IGFBP4 promotes tumor progression. IGFBP4 expression has been shown to be higher in increasing grades of astrocytoma. However, the functional role of IGFBP4 in gliomas has not been explored. Surgical biopsies of 20 normal brain and 198 astrocytoma samples were analyzed for IGFBP4 expression by qRT-PCR. Highest expression of IGFBP4 mRNA was seen in GBM tumors compared to control brain tissues (median log2 of 2.035, p < 0.0001). Immunohistochemical analysis of 53 tissue samples revealed predominant nuclear staining of IGFBP4, seen maximally in GBMs when compared to DA and AA tumors (median LI = 29.12 +/- A 16.943, p < 0.001). Over expression of IGFBP4 in U343 glioma cells resulted in up-regulation of molecules involved in tumor growth, EMT and invasion such as pAkt, pErk, Vimentin, and N-cadherin and down-regulation of E-cadherin. Functionally, IGFBP4 over expression in these cells resulted in increased proliferation, migration and invasion as assessed by MTT, transwell migration, and Matrigel invasion assays. These findings were confirmed upon IGFBP4 knockdown in U251 glioma cells. Our data suggest a pro-tumorigenic role for IGFBP4 in glioma.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Free-standing Pt-aluminide (PtAl) bond coat, when subjected to tensile testing at high temperatures (T >= 900 degrees C), exhibits significant decrease in strength and increase in ductility during deformation at strains exceeding that corresponding to the ultimate tensile strength (UTS), i.e., in the post-UTS regime. The stress-strain curve is also marked by serrations in this regime. Electron back scattered diffraction (EBSD) and transmission electron microscopy (TEM) studies suggest dynamic recovery and recrystallization (DRR) as the mechanisms for the observed tensile behavior in the coating. Activation energy values suggest vacancy diffusion assists DRR. The fine recrystallized grains formed after deformation had a strong < 110 > texture. (c) 2014 Elsevier B.V. All rights reserved.