225 resultados para authentication test


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A test of the useful field of view was introduced more than two decades ago and was designed to reflect the visual difficulties that older adults experience with everyday tasks. Importantly, the useful field of view is one of the most extensively researched and promising predictor tests for a range of driving outcomes measures, including driving ability and crash risk, as well as other everyday tasks. Currently available commercial versions of the test can be administered using personal computers and measure speed of visual processing speed for rapid detection and localization of targets under conditions of divided visual attention and in the presence and absence of visual clutter. The test is believed to assess higher order cognitive abilities, but performance also relies on visual sensory function since targets must be visible in order to be attended to. The format of the useful field of view test has been modified over the years; the original version estimated the spatial extent of useful field of view, while the latest versions measures visual processing speed. While deficits in the useful field of view are associated with functional impairments in everyday activities in older adults, there is also emerging evidence from several research groups that improvements in visual processing speed can be achieved through training. These improvements have been shown to reduce crash risk, and have a positive impact on health and functional well being, with the potential to increase the mobility and hence independence of older adults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IEEE 802.11p is the new standard for intervehicular communications (IVC) using the 5.9 GHz frequency band; it is planned to be widely deployed to enable cooperative systems. 802.11p uses and performance have been studied theoretically and in simulations over the past years. Unfortunately, many of these results have not been confirmed by on-tracks experimentation. In this paper, we describe field trials of 802.11p technology with our test vehicles; metrics such as maximum range, latency and frame loss are examined. Then, we propose a detailed modelisation of 802.11p that can be used to accurately simulate its performance within Cooperative Systems (CS) applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design and synthesis of molecularly or supramolecularly defined interfacial architectures have seen in recent years a remarkable growth of interest and scientific research activities for various reasons. On the one hand, it is generally believed that the construction of an interactive interface between the living world of cells, tissue, or whole organisms and the (inorganic or organic) materials world of technical devices such as implants or medical parts requires proper construction and structural (and functional) control of this organism–machine interface. It is still the very beginning of generating a better understanding of what is needed to make an organism tolerate implants, to guarantee bidirectional communication between microelectronic devices and living tissue, or to simply construct interactive biocompatibility of surfaces in general. This exhaustive book lucidly describes the design, synthesis, assembly and characterization, and bio-(medical) applications of interfacial layers on solid substrates with molecularly or supramolecularly controlled architectures. Experts in the field share their contributions that have been developed in recent years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing efficiency are two parameters to be taken into account when designing a multicast stream protocol. In this paper, we propose to use two families of erasure codes to deal with this problem, namely, rateless codes and maximum distance separable codes. Our constructions will have the following advantages. First, our packet overhead will be small. Second, the number of signature verifications to be performed at the receiver is O(1). Third, every receiver will be able to recover all the original data packets emitted by the sender despite losses and injection occurred during the transmission of information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Design Pressure Test 2013 was a full-day intensive design immersion creative event run on Saturday 3 August 2013, at the QUT Faculty of Creative Industries J Block Design Lab Workshop in Brisbane, Australia, for 25 self-selected high-achieving junior and middle school (year 5-9) students, as part of the Queensland Academies ‘Young Scholars’ Program. Facilitated by tertiary interior design, fashion design and industrial design educators, technicians and six tertiary interior design and fashion design students, the workshop explored design process, environmental impact, the material properties and structural integrity of cardboard, construction techniques, and the production and evaluation of furniture design prototypes. This action research study aimed to facilitate an awareness in young people, of the role and scope of design within our society, the environmental ramifications of design decisions, and the value of design thinking skills in generating strategies to solve basic to complex challenges. It also aimed to investigate the value of collaboration between junior and middle school students, tertiary design educators and students and industry professionals in design awareness, and inspiring post-secondary pathways and idea generation for education. During the creative event, students utilised mathematics skills and developed sketching, making, communication, presentation and collaboration skills to improve their design process, while considering social, cultural and environmental opportunities. Through a series of hands-on collaborative design experiments, participants explored in teams of five, the opportunities available using cardboard as a material – inspiring both functional and aesthetic design solutions. Underpinned by the State Library of Queensland Design Minds Website ‘inquire, ideate and implement’ model of design thinking, the experiments culminated in the development of a detailed client brief, the design and fabrication of a furniture item for seating, and then a team presentation of prototypes to a panel of judges from the professions of architecture, interior design and industrial design, viewed also by parents. The final test for structural integrity was measured by the hoisting down of an adult body weight onto the fabricated seat. The workshop was filmed for the television program ‘Totally Wild’ for dissemination nationally (over 200,000 viewing audience) of the value of design and the Design Minds model to a wider target youth audience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lower extremities are particularly susceptible to injury in an under‐vehicle explosion. Operational fitness of military vehicles is assessed through anthropometric test devices (ATDs) in full‐scale blast tests. The aim of this study was to compare the response between the Hybrid‐III ATD, the MiL‐Lx ATD and cadavers in our traumatic injury simulator, which is able to replicate the response of the vehicle floor in an under‐vehicle explosion. All specimens were fitted with a combat boot and tested on our traumatic injury simulator in a seated position. The load recorded in the ATDs was above the tolerance levels recommended by NATO in all tests; no injuries were observed in any of the 3 cadaveric specimens. The Hybrid‐III produced higher peak forces than the MiL‐Lx. The time to peak strain in the calcaneus of the cadavers was similar to the time to peak force in the ATDs. Maximum compression of the sole of the combat boot was similar for cadavers and MiL‐Lx, but significantly greater for the Hybrid‐III. These results suggest that the MiL‐Lx has a more biofidelic response to under‐vehicle explosive events compared to the Hybrid‐III. Therefore, it is recommended that mitigation strategies are assessed using the MiL‐Lx surrogate and not the Hybrid‐III.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Accurate monitoring of prevalence and trends in population levels of physical activity (PA) is a fundamental public health need. Test-retest reliability (repeatability) was assessed in population samples for four self-report PA measures: the Active Australia survey (AA, N=356), the short International Physical Activity Questionnaire (IPAQ, N=104), the physical activity items in the Behavioral Risk Factor Surveillance System (BRFSS, N=127) and in the Australian National Health Survey (NHS, N=122). Percent agreement and Kappa statistics were used to assess reliability of classification of activity status as 'active', 'insufficiently active' or 'sedentary'. Intraclass correlations (ICCs) were used to assess agreement on minutes of activity reported for each item of each survey and for total minutes. Percent agreement scores for activity status were very good on all four instruments, ranging from 60% for the NHS to 79% for the IPAQ. Corresponding Kappa statistics ranged from 0.40 (NHS) to 0.52 (AA). For individual items, ICCs were highest for walking (0.45 to 0.78) and vigorous activity (0.22 to 0.64) and lowest for the moderate questions (0.16 to 0.44). All four measures provide acceptable levels of test-retest reliability for assessing both activity status and sedentariness, and moderate reliability for assessing total minutes of activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Integer ambiguity resolution is an indispensable procedure for all high precision GNSS applications. The correctness of the estimated integer ambiguities is the key to achieving highly reliable positioning, but the solution cannot be validated with classical hypothesis testing methods. The integer aperture estimation theory unifies all existing ambiguity validation tests and provides a new prospective to review existing methods, which enables us to have a better understanding on the ambiguity validation problem. This contribution analyses two simple but efficient ambiguity validation test methods, ratio test and difference test, from three aspects: acceptance region, probability basis and numerical results. The major contribution of this paper can be summarized as: (1) The ratio test acceptance region is overlap of ellipsoids while the difference test acceptance region is overlap of half-spaces. (2) The probability basis of these two popular tests is firstly analyzed. The difference test is an approximation to optimal integer aperture, while the ratio test follows an exponential relationship in probability. (3) The limitations of the two tests are firstly identified. The two tests may under-evaluate the failure risk if the model is not strong enough or the float ambiguities fall in particular region. (4) Extensive numerical results are used to compare the performance of these two tests. The simulation results show the ratio test outperforms the difference test in some models while difference test performs better in other models. Particularly in the medium baseline kinematic model, the difference tests outperforms the ratio test, the superiority is independent on frequency number, observation noise, satellite geometry, while it depends on success rate and failure rate tolerance. Smaller failure rate leads to larger performance discrepancy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE Accurate monitoring of prevalence and trends in population levels of physical activity is fundamental to the planning of health promotion and disease-prevention strategies. Test-retest reliability (repeatability) was assessed for four self-report measures of physical activity commonly used in population surveys: the Active Australia survey (AA, N=356), the short form of the International Physical Activity Questionnaire (IPAQ-S, N=104), the physical activity items in the Behavioral Risk Factor Surveillance System (BRFSS, N=127) and the physical activity items in the Australian National Health Survey (NHS, N=122). METHODS Percent agreement and Kappa statistics were used to assess the reliability of classification of activity status (where ‘active’= 150 minutes of activity per week) and sedentariness (where ‘sedentary’ = reporting no physical activity). Intraclass correlations (ICCs) were used to assess agreement on minutes of activity reported for each item of each survey and on total minutes reported in each survey. RESULTS Percent agreement scores for both activity status and sedentariness were very good on all four instruments. Overall the percent agreement between repeated surveys was between 73% (NHS) and 87% (IPAQ) for the criterion measure of achieving 150 minutes per week, and between 77% (NHS) and 89% (IPAQ) for the criterion of being sedentary. Corresponding Kappa statistics ranged from 0.46 (NHS) to 0.61 (AA) for activity status and from 0.20 (BRFSS) to 0.52 (AA) for sedentariness. For the individual items ICCs were highest for walking (0.45 to 0.56) and vigorous activity (0.22 to 0.64) and lowest for the moderate questions (0.16 to 0.44). CONCLUSION All four measures provide acceptable levels of test-retest reliability for assessing both activity status and sedentariness, and moderate reliability for assessing total minutes of activity. Supported by the Australian Commonwealth Department of Health and Ageing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The branded pause advertisement is a recently developed online television-advertising format that displays a full-screen still-image banner ad whenever a viewer pauses a streaming-video program. This study used a controlled lab experiment to compare the effectiveness of branded pause advertisements with normal online television advertisements. The results demonstrate that branded pause advertisements are effective but only when combined with a long-exposure advertisement for the same brand. Despite their short exposure time, pause advertisements function as effective reminders, building awareness through repeat exposure. The findings of the current study were similar regardless of whether pause advertisements were activated as a result of viewers’ pausing at a time of their own choosing or whether viewers were interrupted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.