233 resultados para Secret Sharing Schemes


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the critical role of knowledge sharing (KS) in leveraging manufacturing activities, namely integrated supplier management (ISM) and new product development (NPD) to improve business performance (BP) within the context of Taiwanese electronic manufacturing companies. The research adopted a sequential mixed method research design, which provided both quantitative empirical evidence as well as qualitative insights, into the moderating effect of KS on the relationships between these two core manufacturing activities and BP. First, a questionnaire survey was administered, which resulted in a sample of 170 managerial and technical professionals providing their opinions on KS, NPD and ISM activities and the BP level within their respective companies. On the basis of the collected data, factor analysis was used to verify the measurement model, followed by correlation analysis to explore factor interrelationships, and finally moderated regression analyses to extract the moderating effects of KS on the relationships of NPD and ISM with BP. Following the quantitative study, six semi-structured interviews were conducted to provide qualitative in-depth insights into the value added from KS practices to the targeted manufacturing activities and the extent of its leveraging power. Results from quantitative statistical analysis indicated that KS, NPD and ISM all have a significant positive impact on BP. Specifically, IT infrastructure and open communication were identified as the two types of KS practices that could facilitate enriched supplier evaluation and selection, empower active employee involvement in the design process, and provide support for product simplification and the modular design process, thereby improving manufacturing performance and strengthening company competitiveness. The interviews authenticated many of the empirical findings, suggesting that in the contemporary manufacturing context KS has become an integral part of many ISM and NPD activities and when embedded properly can lead to an improvement in BP. The paper also highlights a number of useful implications for manufacturing companies seeking to leverage their BP through innovative and sustained KS practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Infrastructure forms a vital component in supporting today’s way of life and has a significant role or impact on economic, environmental and social outcomes of the region around it. The design, construction and operation of such assets are a multi-billion dollar industry in Australia alone. Another issue that will play a major role in our way life is that of climate change and the greater concept of sustainability. With limited resources and a changing natural world it is necessary for infrastructure to be developed and maintained in a manner that is sustainable. In order to achieve infrastructure sustainability in operations it is necessary for there to be: a sustainability assessment scheme that provides a scientifically sound and realistic approach to measuring an assets level of sustainability; and, systems and tools to support the making of decisions that result in sustainable outcomes by providing feedback in a timely manner. Having these in place will then help drive the consideration of sustainability during the decision making process for infrastructure operations and maintenance. In this paper we provide two main contributions; a comparison and review of sustainability assessment schemes for infrastructure and their suitability for use in the operations phase; and, a review of decision support systems/tools in the area of infrastructure sustainability in operations. For this paper, sustainability covers not just the environment, but also finance/economic and societal/community aspects as well. This is often referred to as the Triple Bottom Line and forms one of the three dimensions of corporate sustainability [Stapledon, 2004].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Knowledge has been widely recognised as a determinant of business performance. Business capabilities require an effective share of resource and knowledge. Specifically, knowledge sharing (KS) between different companies and departments can improve manufacturing processes since intangible knowledge plays an enssential role in achieving competitive advantage. This paper presents a mixed method research study into the impact of KS on the effectiveness of new product development (NPD) in achieving desired business performance (BP). Firstly, an empirical study utilising moderated regression analysis was conducted to test whether and to what extent KS has leveraging power on the relationship between NPD and BP constructs and variables. Secondly, this empirically verified hypothesis was validated through explanatory case studies involving two Taiwanese manufacturing companies using a qualitative interaction term pattern matching technique. The study provides evidence that knowledge sharing and management activities are essential for deriving competitive advantage in the manufacturing industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Manufacturing companies have strived to enhance managerial and technical capabilities to improve business performance. Building these capabilities requires effective share of knowledge - the strategic resource. Specifically, knowledge sharing (KS) between different manufacturing departments can improve manufacturing processes since leveraging organisational knowledge plays an enssential role in achieving competitive advantage. This paper presents an empirical investigation into the impact of KS on the effectiveness of supply chain management (SCM) and the product development process (PDP) in achieving desired business performance (BP). A questionnaire survey was administered from electronic manufacturing companies operating in Taiwan. 168 valid responses were received and used to statistically examine the relationships between the concepts (SCM, PDP, KS, BP). The study findings reveal that within the Taiwanese electronic manufacturing companies KS is an essential enabler for facilitating the effectiveness of SCM and PDP in achieving desired BP.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this research was to investigate the effects of driving conditions and suspension parameters on dynamic load-sharing of longitudinal-connected air suspensions of a tri-axle semi-trailer. A novel nonlinear model of a multi-axle semi-trailer with longitudinal-connected air suspension was formulated based on fluid mechanics and thermodynamics and was validated through test results. The effects of driving conditions and suspension parameters on dynamic load-sharing and road-friendliness of the semi-trailer were analyzed. Simulation results indicate that the road-friendliness metric-DLC (dynamic load coefficient) is not always in accordance with the load-sharing metric-DLSC (dynamic load-sharing coefficient). The effect of employing larger air lines and connectors on the DLSC optimization ratio gives varying results as road roughness increases and as driving speed increases. When the vehicle load reduces, or the static pressure increases, the DLSC optimization ratio declines monotonically. The results also indicate that if the air line diameter is always assumed to be larger than the connector diameter, the influence of air line diameter on load-sharing is more significant than that of the connector.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose - Researchers debate whether tacit knowledge sharing through Information Technology (IT) is actually possible. However, with the advent of social web tools, it has been argued that most shortcomings of tacit knowledge sharing are likely to disappear. This paper has two purposes: firstly, to demonstrate the existing debates in the literature regarding tacit knowledge sharing using IT, and secondly, to identify key research gaps that lay the foundations for future research into tacit knowledge sharing using social web. Design/methodology/approach - This paper reviews current literature on IT-mediated tacit knowledge sharing and opens a discussion on tacit knowledge sharing through the use of social web. Findings - First, the existing schools of thoughts in regards to IT ability for tacit knowledge sharing are introduced. Next, difficulties of sharing tacit knowledge through the use of IT are discussed. Then, potentials and pitfalls of social web tools are presented. Finally, the paper concludes that whilst there are significant theoretical arguments supporting that the social web facilitates tacit knowledge sharing there is a lack of empirical evidence to support these arguments and further work is required. Research limitations/implications - The limitations of the review includes: covering only papers that were published in English, issues of access to full texts of some resources, possibility of missing some resources due to search strings used or limited coverage of databases searched. Originality/value - The paper contributes to the fast growing literature on the intersection of KM and IT particularly by focusing on tacit knowledge sharing in social media space. The paper highlights the need for further studies in this area by discussing the current situation in the literature and disclosing the emerging questions and gaps for future studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Food is inherently cultural yet traditionally overlooked in many disciplines as a topic worthy of serious investigation. This thesis investigates how food, as a topic of interest, is thriving in an online environment through recipe sharing on food blogs. It applies an ethnographic approach to online community studies, providing a rich description of the food blogging community. The thesis demonstrates how the food blogging can be seen as a community. Through a case study focusing on a one recipe shared across many blogs, it also examines the community in action. As the community has grown, it has become more complex, structured and diverse. The thesis examines its evolution and the response of food-related media and other industries to food blogging. The nature of the food blogging community reflects the cultural and social nature of food and the ongoing evolution of recipe sharing through food-related media. Food blogs provide an insight into the eating habits of ‘ordinary’ people, in a more broad-based manner than traditional food-related media such as cookbooks. Beyond this, food blogs are part of wider cultural trends towards DIY, and provide a useful example of the ongoing transformation of food-related media, food culture, and indeed, culture more broadly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermarking schemes. We consider vulnerabilities such as the exploitation of a weak correlation among block-wise dependent watermarks to modify valid watermarked %(medical or other digital) images, where they could still be verified as authentic, though they are actually not. Experimental results successfully demonstrate the practicability and consequences of the proposed attacks for some relevant schemes. The development of the proposed attack models can be used as a means to systematically examine the security levels of similar watermarking schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the discursive aspects of Twitter communication during the floods in the summer of 2010–2011 in Queensland, Australia. Using a representative sample of communication associated with the #qldfloods hashtag on Twitter, we coded and analysed the patterns of communication. We focus on key phenomena in the use of social media in crisis communication: communal sense- making practices, the negotiation of participant roles, and digital convergence around shared events. Social media is used both as a crisis communication and emergency management tool, as well as a space for participants to engage in emotional exchanges and communication of distress.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social media adoption in Australia, which provides the geographic focus for this chapter, has been rapid and substantial (ABC News, 2010) – possibly because of the considerable dispersal of the Australian population across the continent, as well as the significant distance of the country from many of its closest partner nations. Social media can play an important role in strengthening and maintaining interpersonal and professional relationships in spite of such physical distance; in particular, social media services are now well-recognised as important tools for the dissemination of news across many developed nations. Hermida (2010) and Burns (2010) both speak of Twitter as a medium for “ambient news”, for example: always-on, operating as a steady stream in the background and at the edge of users’ conscious perception. Much as ambient music is designed to do, it comes to the fore when notable events (such as major breaking news) lead to an increase in volume and demand a greater level of attention from users.