81 resultados para Key Recovery Attack
Self-organized public key management in MANETs with enhanced security and without certificate-chains
Resumo:
In the self-organized public key management approaches, public key verification is achieved through verification routes constituted by the transitive trust relationships among the network principals. Most of the existing approaches do not distinguish among different available verification routes. Moreover, to ensure stronger security, it is important to choose an appropriate metric to evaluate the strength of a route. Besides, all of the existing self-organized approaches use certificate-chains for achieving authentication, which are highly resource consuming. In this paper, we present a self-organized certificate-less on-demand public key management (CLPKM) protocol, which aims at providing the strongest verification routes for authentication purposes. It restricts the compromise probability for a verification route by restricting its length. Besides, we evaluate the strength of a verification route using its end-to-end trust value. The other important aspect of the protocol is that it uses a MAC function instead of RSA certificates to perform public key verifications. By doing this, the protocol saves considerable computation power, bandwidth and storage space. We have used an extended strand space model to analyze the correctness of the protocol. The analytical, simulation, and the testbed implementation results confirm the effectiveness of the proposed protocol. (c) 2014 Elsevier B.V. All rights reserved.
Resumo:
Permanent plastic deformation induced by mechanical contacts affects the shape recovery of shape memory alloys. To understand the shape recovery of NiTiCu thin films subjected to local contact stresses, systematic investigations are carried out by inducing varying levels of contact stresses using nanoindentation. The resulting indents are located precisely for imaging using a predetermined array consisting of different sized indents. Morphology and topography of these indents before and after shape recovery are characterized using Scanning Electron Microscope and Atomic Force Microscope quantitatively. Shape recovery is found to be dependent on the contact stresses at the low loads while the recovery ratio remains constant at 0.13 for higher loads. Shape recovery is found to occur mainly in depth direction of the indent, while far field residual stresses play very little role in the recovery. (C) 2014 Elsevier B.V. All rights reserved.
Resumo:
Introduction: Immunomodulators are agents, which can modulate the immune response to specific antigens, while causing least toxicity to the host system. Being part of the modern vaccine formulations, these compounds have contributed remarkably to the field of therapeutics. Despite the successful record maintained by these agents, the requirement of novel immunomodulators keeps increasing due to the increasing severity of diseases. Hence, research regarding the same holds great importance. Areas covered: In this review, we discuss the role of immunomodulators in improving performance of various vaccines used for counteracting most threatening infectious diseases, mechanisms behind their action and criteria for development of novel immunomodulators. Expert opinion: Understanding the molecular mechanisms underlying immune response is a prerequisite for development of effective therapeutics as these are often exploited by pathogens for their own propagation. Keeping this in mind, the present research in the field of immunotherapy focuses on developing immunomodulators that would not only enhance the protection against pathogen, but also generate a long-term memory response. With the introduction of advanced formulations including combination of different kinds of immunomodulators, one can expect tremendous success in near future.
Resumo:
Key aspects of Organic Photovoltaics (OPVs) have been reviewed in this tutorial. Issues pertaining to the choice of materials, fabrication processes, photophysical mechanisms, device characterization, morphology of active layers and manufacturing are discussed. Special emphasis has been given to recent developments in large-area modules. Current strategies in enhancing the performance using external optical engineering approaches have also been highlighted. OPVs as a technology combine low weight, flexibility, low cost, good form factor and high-throughput processing; making them a promising PV technology for the future.
Resumo:
Blends of bromo-terminated polystyrene (PS-Br) and poly(vinyl methylether) (PVME) exhibit lower critical solution temperatures. In this study, PS-Br was designed by atom transfer radical polymerization and was converted to thiol-capped polystyrene (PS-SH) by reacting with thiourea. The silver nanoparticles (nAg) were then decorated with covalently bound PS-SH macromolecules to improve the phase miscibility in the PS-Br-PVME blends. Thermally induced demixing in this model blend was followed in the presence of polystyrene immobilized silver nanoparticles (PS-g-nAg). The graft density of the PS macromolecules was estimated to be ca. 0.78 chains per nm(2). Although the matrix and the grafted molecular weights were similar, PS-g-nAg particles were expelled from the PS phase and were localized in the PVME phase of the blends. This was addressed with respect to intermediate graft density and favourable PS-PVME contacts from microscopic interactions point of view. Interestingly, blends with 0.5 wt% PS-g-nAg delayed the spinodal decomposition temperature in the blends by ca. 18 degrees C with respect to the control blends. The scale of cooperativity, as determined by differential scanning calorimetry, increased only marginally in the case of PS-g-nAg; however, it increased significantly in the presence of bare nAg particles.
Resumo:
Communication complexity refers to the minimum rate of public communication required for generating a maximal-rate secret key (SK) in the multiterminal source model of Csiszar and Narayan. Tyagi recently characterized this communication complexity for a two-terminal system. We extend the ideas in Tyagi's work to derive a lower bound on communication complexity in the general multiterminal setting. In the important special case of the complete graph pairwise independent network (PIN) model, our bound allows us to determine the exact linear communication complexity, i.e., the communication complexity when the communication and SK are restricted to be linear functions of the randomness available at the terminals.
Resumo:
User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.
Nitric oxide is the key mediator of death induced by fisetin in human acute monocytic leukemia cells
Resumo:
Nitric oxide ( NO) has been shown to be effective in cancer chemoprevention and therefore drugs that help generate NO would be preferable for combination chemotherapy or solo use. This study shows a new evidence of NO as a mediator of acute leukemia cell death induced by fisetin, a promising chemotherapeutic agent. Fisetin was able to kill THP-1 cells in vivo resulting in tumor shrinkage in the mouse xenograft model. Death induction in vitro was mediated by an increase in NO resulting in double strand DNA breaks and the activation of both the extrinsic and the intrinsic apoptotic pathways. Double strand DNA breaks could be reduced if NO inhibitor was present during fisetin treatment. Fisetin also inhibited the downstream components of the mTORC1 pathway through downregulation of levels of p70 S6 kinase and inducing hypo-phosphorylation of S6 Ri P kinase, eIF4B and eEF2K. NO inhibition restored phosphorylation of downstream effectors of mTORC1 and rescued cells from death. Fisetin induced Ca2+ entry through L-type Ca2+ channels and abrogation of Ca2+ influx reduced caspase activation and cell death. NO increase and increased Ca2+ were independent phenomenon. It was inferred that apoptotic death of acute monocytic leukemia cells was induced by fisetin through increased generation of NO and elevated Ca2+ entry activating the caspase dependent apoptotic pathways. Therefore, manipulation of NO production could be viewed as a potential strategy to increase efficacy of chemotherapy in acute monocytic leukemia.
Resumo:
Based on an ultrasound-modulated optical tomography experiment, a direct, quantitative recovery of Young's modulus (E) is achieved from the modulation depth (M) in the intensity autocorrelation. The number of detector locations is limited to two in orthogonal directions, reducing the complexity of the data gathering step whilst ensuring against an impoverishment of the measurement, by employing ultrasound frequency as a parameter to vary during data collection. The M and E are related via two partial differential equations. The first one connects M to the amplitude of vibration of the scattering centers in the focal volume and the other, this amplitude to E. A (composite) sensitivity matrix is arrived at mapping the variation of M with that of E and used in a (barely regularized) Gauss-Newton algorithm to iteratively recover E. The reconstruction results showing the variation of E are presented. (C) 2015 Optical Society of America
Resumo:
As the volume of data relating to proteins increases, researchers rely more and more on the analysis of published data, thus increasing the importance of good access to these data that vary from the supplemental material of individual articles, all the way to major reference databases with professional staff and long-term funding. Specialist protein resources fill an important middle ground, providing interactive web interfaces to their databases for a focused topic or family of proteins, using specialized approaches that are not feasible in the major reference databases. Many are labors of love, run by a single lab with little or no dedicated funding and there are many challenges to building and maintaining them. This perspective arose from a meeting of several specialist protein resources and major reference databases held at the Wellcome Trust Genome Campus (Cambridge, UK) on August 11 and 12, 2014. During this meeting some common key challenges involved in creating and maintaining such resources were discussed, along with various approaches to address them. In laying out these challenges, we aim to inform users about how these issues impact our resources and illustrate ways in which our working together could enhance their accuracy, currency, and overall value. Proteins 2015; 83:1005-1013. (c) 2015 The Authors. Proteins: Structure, Function, and Bioinformatics Published by Wiley Periodicals, Inc.
Resumo:
We investigate the problem of timing recovery for 2-D magnetic recording (TDMR) channels. We develop a timing error model for TDMR channel considering the phase and frequency offsets with noise. We propose a 2-D data-aided phase-locked loop (PLL) architecture for tracking variations in the position and movement of the read head in the down-track and cross-track directions and analyze the convergence of the algorithm under non-separable timing errors. We further develop a 2-D interpolation-based timing recovery scheme that works in conjunction with the 2-D PLL. We quantify the efficiency of our proposed algorithms by simulations over a 2-D magnetic recording channel with timing errors.
Resumo:
Compressive Sensing (CS) theory combines the signal sampling and compression for sparse signals resulting in reduction in sampling rate. In recent years, many recovery algorithms have been proposed to reconstruct the signal efficiently. Subspace Pursuit and Compressive Sampling Matching Pursuit are some of the popular greedy methods. Also, Fusion of Algorithms for Compressed Sensing is a recently proposed method where several CS reconstruction algorithms participate and the final estimate of the underlying sparse signal is determined by fusing the estimates obtained from the participating algorithms. All these methods involve solving a least squares problem which may be ill-conditioned, especially in the low dimension measurement regime. In this paper, we propose a step prior to least squares to ensure the well-conditioning of the least squares problem. Using Monte Carlo simulations, we show that in low dimension measurement scenario, this modification improves the reconstruction capability of the algorithm in clean as well as noisy measurement cases.
Resumo:
Methylenetetrahydrofolate dehydrogenase-cyclohydrolase (FolD) catalyzes interconversion of 5,10-methylene-tetrahydrofolate and 10-formyl-tetrahydrofolate in the one-carbon metabolic pathway. In some organisms, the essential requirement of 10-formyl-tetrahydrofolate may also be fulfilled by formyltetrahydrofolate synthetase (Fhs). Recently, we developed an Escherichia coli strain in which the folD gene was deleted in the presence of Clostridium perfringens fhs (E. coli Delta folD/p-fhs) and used it to purify FolD mutants (free from the host-encoded FolD) and determine their biological activities. Mutations in the key residues of E. coli FolD, as identified from three-dimensional structures (D121A, Q98K, K54S, Y50S, and R191E), and a genetic screen (G122D and C58Y) were generated, and the mutant proteins were purified to determine their kinetic constants. Except for the R191E and K54S mutants, others were highly compromised in terms of both dehydrogenase and cyclohydrolase activities. While the R191E mutant showed high cyclohydrolase activity, it retained only a residual dehydrogenase activity. On the other hand, the K54S mutant lacked the cyclohydrolase activity but possessed high dehydrogenase activity. The D121A and G122D (in a loop between two helices) mutants were highly compromised in terms of both dehydrogenase and cyclohydrolase activities. In vivo and in vitro characterization of wild-type and mutant (R191E, G122D, D121A, Q98K, C58Y, K54S, and Y50S) FolD together with three-dimensional modeling has allowed us to develop a better understanding of the mechanism for substrate binding and catalysis by E. coli FolD.
Resumo:
Diaminopropionate ammonialyase (DAPAL), a fold-typeII pyridoxal 5-phosphate-dependent enzyme, catalyzes the ,-elimination of diaminopropionate (DAP) to pyruvate and ammonia. DAPAL was able to utilize both d- and l-DAP as substrates with almost equal efficiency. Mutational analysis of functionally important residues such as Thr385, Asp125 and Asp194 was carried out to understand the mechanism by which the isomers are hydrolyzed. Further, the putative residues involved in the formation of disulfide bond Cys271 and Cys299 were also mutated. T385S, T385D sDAPAL were as active with dl-DAP as substrate as sDAPAL, whereas the later exhibited a threefold increase in catalytic efficiency with d-Ser as substrate. Further analysis of these mutants suggested that DAPAL might follow an anti-E-2 mechanism of catalysis that does not involve the formation of a quinonoid intermediate. Of the two mutants of Asp125, D125E showed complete loss of activity with d-DAP as substrate, whereas the reaction with l-DAP was not affected significantly, demonstrating that Asp125 was essential for abstraction of protons from the d-isomer. By contrast, mutational analysis of Asp194 showed that the residue may not be directly involved in proton abstraction from l-DAP. sDAPAL does not form a disulfide bond in solution, although the position of Cys299 and Cys271 in the modeled structure of sDAPAL favored the formation of a disulfide bond. Further, unlike eDAPAL, sDAPAL could be activated by monovalent cations. Mutation of the cysteine residues showed that Cys271 may be involved in coordinating the monovalent cation, as observed in the case of other fold-typeII enzymes.
Resumo:
A routing protocol in a mobile ad hoc network (MANET) should be secure against both the outside attackers which do not hold valid security credentials and the inside attackers which are the compromised nodes in the network. The outside attackers can be prevented with the help of an efficient key management protocol and cryptography. However, to prevent inside attackers, it should be accompanied with an intrusion detection system (IDS). In this paper, we propose a novel secure routing with an integrated localized key management (SR-LKM) protocol, which is aimed to prevent both inside and outside attackers. The localized key management mechanism is not dependent on any routing protocol. Thus, unlike many other existing schemes, the protocol does not suffer from the key management - secure routing interdependency problem. The key management mechanism is lightweight as it optimizes the use of public key cryptography with the help of a novel neighbor based handshaking and Least Common Multiple (LCM) based broadcast key distribution mechanism. The protocol is storage scalable and its efficiency is confirmed by the results obtained from simulation experiments.