263 resultados para key schedule
Resumo:
Timed-release cryptography addresses the problem of “sending messages into the future”: information is encrypted so that it can only be decrypted after a certain amount of time, either (a) with the help of a trusted third party time server, or (b) after a party performs the required number of sequential operations. We generalise the latter case to what we call effort-release public key encryption (ER-PKE), where only the party holding the private key corresponding to the public key can decrypt, and only after performing a certain amount of computation which may or may not be parallelisable. Effort-release PKE generalises both the sequential-operation-based timed-release encryption of Rivest, Shamir, and Wagner, and also the encapsulated key escrow techniques of Bellare and Goldwasser. We give a generic construction for ER-PKE based on the use of moderately hard computational problems called puzzles. Our approach extends the KEM/DEM framework for public key encryption by introducing a difficulty notion for KEMs which results in effort-release PKE. When the puzzle used in our generic construction is non-parallelisable, we recover timed-release cryptography, with the addition that only the designated receiver (in the public key setting) can decrypt.
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
As two neighbouring countries, the number of transnational programs between Indonesian and Australian universities is significant. However, little is known about how transnational programs can facilitate knowledge transfer between the partner universities, which is often assumed by the Indonesian universities. Based on a case study regarding a dual degree program between an Indonesian and an Australian university, this paper outlines preliminary findings concerning the role of social ties between the staff of the two partner universities in creating positive inter-university dynamics that is vital for successful knowledge transfer. Using an inter-organisational knowledge transfer theoretical framework, social ties between the staff of the two universities are viewed as an important agent in facilitating knowledge transfer by building trust between the partners, moderating the perception about risk in the partnership, and creating a more equal power relation between the universities. Based on this study, Australian lecturers of Indonesian background and Indonesian lecturers who are alumni of Australian universities are important to initially establish these social ties. While face-to-face contact is still perceived as the ideal means of transferring knowledge and building trust among the Indonesian university staff, those who have stronger social ties with their Australian counterparts tend to use ICT-based communication to acquire knowledge from the Australian university compared to those who have more limited social ties with their Australian counterparts. This paper concludes with some implications for building positive social ties between Indonesian and Australian university staff to strengthen the knowledge transfer process.
Resumo:
Among the Australian general public, there are increasing concerns about environmental issues. Accordingly, sustainability in the housing industry is also becoming a priority on the development agenda. However, putting the principles of ecological sustainability into practice within social and economic development requires intensive involvement of major stakeholders such as governments, developers, builders, consumers and a range of other professionals. Establishing a sustainable value entails asymmetric life-cycle returns, making it important for major stakeholders to appreciate the benefits of this new agenda not only for the individual businesses but also for other supply chain partners. This context warrants the study to promote collective benefits for key stakeholders by establishing a mutual-benefit framework for sustainable housing implementation. A research was carried out in the hope to establish a mutual-benefit framework by investigating challenges of achieving benefits (CABs) from sustainable housing development in a multi-stakeholder context. In the research work reported in this article, a comparative questionnaire study was first conducted among seven stakeholder groups in the Australian housing industry, to examine the importance and inter-relationships of CABs. In-depth interviews then furthered the survey findings with a focus on stakeholder diversity. The synthesized findings of the survey and interview study lead to the identification of 12 critical mutual-benefit factors and their mutual influence. Based on such a platform, a systematic framework is developed with the aid of Interpretive Structural Modelling (ISM), to identify the patterns of stakeholder benefit materialisation, suggest the priority of critical factors and provide related stakeholder-specific action guide for sustainable housing implementation.
Resumo:
A quantitative, quasi-experimental study of the effectiveness of computer-based scientific visualizations for concept learning on the part of Year 11 physics students (n=80) was conducted in six Queensland high school classrooms. Students’ gender and academic ability were also considered as factors in relation to the effectiveness of teaching with visualizations. Learning with visualizations was found to be equally effective as learning without them for all students, with no statistically significant difference in outcomes being observed for the group as a whole or on the academic ability dimension. Male students were found to learn significantly better with visualizations than without, while no such effect was observed for female students. This may give rise to some concern for the equity issues raised by introducing visualizations. Given that other research shows that students enjoy learning with visualizations and that their engagement with learning is enhanced, the finding that the learning outcomes are the same as for teaching without visualizations supports teachers’ use of visualizations.
Resumo:
Long undersea debris runout can be facilitated by a boundary layer formed by weak marine sediments under a moving slide mass. Undrained loading of such offshore sediment results in a profound drop of basal shear resistance, compared to subaerial shear resistance, enabling long undersea runout. Thus large long-runout submarine landslides are not truly enigmatic (Voight and Elsworth 1992, 1997), but are understandable in terms of conventional geotechnical principles. A corollary is that remoulded undrained strength, and not friction angle, should be used for basal resistance in numerical simulations. This hypothesis is testable via drilling and examining the structure at the soles of undersea debris avalanches for indications of incorporation of sheared marine sediments, by tests of soil properties, and by simulations. Such considerations of emplacement process are an aim of ongoing research in the Lesser Antilles (Caribbean Sea), where multiple offshore debris avalanche and dome-collapse debris deposits have been identified since 1999 on swath bathymetric surveys collected in five oceanographic cruises. This paper reviews the prehistoric and historic collapses that have occurred offshore of Antilles arc islands and summarizes ongoing research on emplacement processes.
Resumo:
Optimising the container transfer schedule at the multimodal terminals is known to be NP-hard, which implies that the best solution becomes computationally infeasible as problem sizes increase. Genetic Algorithm (GA) techniques are used to reduce container handling/transfer times and ships' time at the port by speeding up handling operations. The GA is chosen due to the relatively good results that have been reported even with the simplest GA implementations to obtain near-optimal solutions in reasonable time. Also discussed, is the application of the model to assess the consequences of increased scheduled throughput time as well as different strategies such as the alternative plant layouts, storage policies and number of yard machines. A real data set used for the solution and subsequent sensitivity analysis is applied to the alternative plant layouts, storage policies and number of yard machines.
Resumo:
Recently, a stream of project management research has recognized the critical role of boundary objects in the organization of projects. In this paper, we investigate how one advanced scheduling tool, the Integrated Master Schedule (IMS), is used as a temporal boundary object at various stages of complex projects. The IMS is critical to megaprojects which typically span long periods of time and face a high degree of complexity and uncertainty. In this paper, we conceptualize projects of this type as complex adaptive systems (CAS). We report the findings of four case projects on how the IMS mapped interactions, interdependencies, constraints, and fractal patterns of these emerging projects, and how the process of IMS visualization enabled communication and negotiation of project realities. This paper highlights that this advanced timeline tool acts as a boundary object and elicits shared understanding of complex projects from their stakeholders.
Resumo:
This paper presents a summary of the key findings of the TTF TPACK Survey developed and administered for the Teaching the Teachers for the Future (TTF) Project implemented in 2011. The TTF Project, funded by an Australian Government ICT Innovation Fund grant, involved all 39 Australian Higher Education Institutions which provide initial teacher education. TTF data collections were undertaken at the end of Semester 1 (T1) and at the end of Semester 2 (T2) in 2011. A total of 12881 participants completed the first survey (T1) and 5809 participants completed the second survey (T2). Groups of like-named items from the T1 survey were subject to a battery of complementary data analysis techniques. The psychometric properties of the four scales: Confidence - teacher items; Usefulness - teacher items; Confidence - student items; Usefulness- student items, were confirmed both at T1 and T2. Among the key findings summarised, at the national level, the scale: Confidence to use ICT as a teacher showed measurable growth across the whole scale from T1 to T2, and the scale: Confidence to facilitate student use of ICT also showed measurable growth across the whole scale from T1 to T2. Additional key TTF TPACK Survey findings are summarised.
Resumo:
Background Lower extremity amputation results in significant global morbidity and mortality. Australia appears to have a paucity of studies investigating lower extremity amputation. The primary aim of this retrospective study was to investigate key conditions associated with lower extremity amputations in an Australian population. Secondary objectives were to determine the influence of age and sex on lower extremity amputations, and the reliability of hospital coded amputations. Methods: Lower extremity amputation cases performed at the Princess Alexandra Hospital (Brisbane, Australia) between July 2006 and June 2007 were identified through the relevant hospital discharge dataset (n = 197). All eligible clinical records were interrogated for age, sex, key condition associated with amputation, amputation site, first ever amputation status and the accuracy of the original hospital coding. Exclusion criteria included records unavailable for audit and cases where the key condition was unable to be determined. Chi-squared, t-tests, ANOVA and post hoc tests were used to determine differences between groups. Kappa statistics were used to measure reliability between coded and audited amputations. A minimum significance level of p < 0.05 was used throughout. Results: One hundred and eighty-six cases were eligible and audited. Overall 69% were male, 56% were first amputations, 54% were major amputations, and mean age was 62 ± 16 years. Key conditions associated included type 2 diabetes (53%), peripheral arterial disease (non-diabetes) (18%), trauma (8%), type 1 diabetes (7%) and malignant tumours (5%). Differences in ages at amputation were associated with trauma 36 ± 10 years, type 1 diabetes 52 ± 12 years and type 2 diabetes 67 ± 10 years (p < 0.01). Reliability of original hospital coding was high with Kappa values over 0.8 for all variables. Conclusions: This study, the first in over 20 years to report on all levels of lower extremity amputations in Australia, found that people undergoing amputation are more likely to be older, male and have diabetes. It is recommended that large prospective studies are implemented and national lower extremity amputation rates are established to address the large preventable burden of lower extremity amputation in Australia.
Resumo:
Creativity is an attribute of individual people, but also a feature of organizations like firms, cultural institutions and social networks. In the knowledge economy of today, creativity is of increasing value, for developing, emergent and advanced countries, and for competing cities. This book is the first to present an organized study of the key concepts that underlie and motivate the field of creative industries. Written by a world-leading team of experts, it presents readers with compact accounts of the history of terms, the debates and tensions associated with their usage, and examples of how they apply to the creative industries around the world. Crisp and relevant, this is an invaluable text for students of the creative industries across a range of disciplines, especially media, communication, economics, sociology, creative and performing arts and regional studies.
Resumo:
The launch of the Centre of Research Excellence in Reducing Healthcare Associated Infection (CRE-RHAI) took place in Sydney on Friday 12 October 2012. The mission of the CRE-RHAI is to generate new knowledge about strategies to reduce healthcare associated infections and to provide data on the cost-effectiveness of infection control programs. As well as launching the CRE-RHAI, an important part of this event was a stakeholder Consultation Workshop, which brought together several experts in the Australian infection control community. The aims of this workshop were to establish the research and clinical priorities in Australian infection control, assess the importance of various multi-resistant organisms, and to gather information about decision making in infection control. We present here a summary and discussion of the responses we received.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
This chapter presents a comparative survey of recent key management (key distribution, discovery, establishment and update) solutions for wireless sensor networks. We consider both distributed and hierarchical sensor network architectures where unicast, multicast and broadcast types of communication take place. Probabilistic, deterministic and hybrid key management solutions are presented, and we determine a set of metrics to quantify their security properties and resource usage such as processing, storage and communication overheads. We provide a taxonomy of solutions, and identify trade-offs in these schemes to conclude that there is no one-size-fits-all solution.