210 resultados para cryptographic protocol
Resumo:
The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.
Resumo:
Background: The prevalence of type 2 diabetes is rising with the majority of patients practicing inadequate disease self-management. Depression, anxiety, and diabetes-specific distress present motivational challenges to adequate self-care. Health systems globally struggle to deliver routine services that are accessible to the entire population, in particular in rural areas. Web-based diabetes self-management interventions can provide frequent, accessible support regardless of time and location Objective: This paper describes the protocol of an Australian national randomized controlled trial (RCT) of the OnTrack Diabetes program, an automated, interactive, self-guided Web program aimed to improve glycemic control, diabetes self-care, and dysphoria symptoms in type 2 diabetes patients. Methods: A small pilot trial is conducted that primarily tests program functionality, efficacy, and user acceptability and satisfaction. This is followed by the main RCT, which compares 3 treatments: (1) delayed program access: usual diabetes care for 3 months postbaseline followed by access to the full OnTrack Diabetes program; (2) immediate program: full access to the self-guided program from baseline onward; and (3) immediate program plus therapist support via Functional Imagery Training (FIT). Measures are administered at baseline and at 3, 6, and 12 months postbaseline. Primary outcomes are diabetes self-care behaviors (physical activity participation, diet, medication adherence, and blood glucose monitoring), glycated hemoglobin A1c (HbA1c) level, and diabetes-specific distress. Secondary outcomes are depression, anxiety, self-efficacy and adherence, and quality of life. Exposure data in terms of program uptake, use, time on each page, and program completion, as well as implementation feasibility will be conducted. Results: This trial is currently underway with funding support from the Wesley Research Institute in Brisbane, Australia. Conclusions: This is the first known trial of an automated, self-guided, Web-based support program that uses a holistic approach in targeting both type 2 diabetes self-management and dysphoria. Findings will inform the feasibility of implementing such a program on an ongoing basis, including in rural and regional locations.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
Review question/objective The objective of this review is to find, critically appraise and synthesize the available quantitative evidence on the effectiveness of interventions that promote successful teaching of the evidence-based practice process in undergraduate health students, in preparation for them to become professional evidence-based practitioners. More specifically, the question that this review seeks to answer is: What is the effectiveness of teaching strategies for evidence-based practice for undergraduate health students? Inclusion criteria Types of participants This review will consider studies that include undergraduate health students from any undergraduate health discipline, including but not limited to medicine, nursing and allied health. Post graduate and post-registration students will not be included. Types of interventions This review will consider studies that evaluate strategies or interventions aimed at teaching any or all of the five steps of evidence-based practice, namely asking a structured clinical question; collecting the best evidence available; critically appraising the evidence to ensure validity, relevance and applicability; applying or integrating the results into clinical practice, and evaluating outcomes. The strategy may take place solely within a tertiary education environment or may be combined with a clinical setting. Types of outcomes This review will consider studies that include the following outcome measures: evidence-based practice behavior, knowledge, skills, attitudes, self-efficacy (or self-confidence), beliefs, values, intention to use evidence-based practice (future use) and confidence levels. Tools used to measure these outcomes will be assessed for reported validity, reliability and generalizability. Outcomes will be measured during the student’s education period up to graduation. If studies are conducted across different year levels this will be taken into account during analysis and reported accordingly.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows: To evaluate the efficacy of inhaled corticosteroids in reducing the severity of cough in children with sub-acute cough (defined as cough duration of two to four weeks).
Resumo:
For the past few years, research works on the topic of secure outsourcing of cryptographic computations has drawn significant attention from academics in security and cryptology disciplines as well as information security practitioners. One main reason for this interest is their application for resource constrained devices such as RFID tags. While there has been significant progress in this domain since Hohenberger and Lysyanskaya have provided formal security notions for secure computation delegation, there are some interesting challenges that need to be solved that can be useful towards a wider deployment of cryptographic protocols that enable secure outsourcing of cryptographic computations. This position paper brings out these challenging problems with RFID technology as the use case together with our ideas, where applicable, that can provide a direction towards solving the problems.
Resumo:
Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified their protocol’s security by data reduction method with the learning parity with noise (LPN) and also formally verified the functionality of the proposed scheme by Colored Petri Nets. In this paper, we investigate RIPTA-DA’s security. We present an efficient secret disclosure attack against the protocol which can be used to mount both de-synchronization and traceability attacks against the protocol. Thus our attacks show that RIPTA-DA protocol is not a RIPTA-DA.
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.
Resumo:
In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.
Resumo:
Underwater wireless sensor networks (UWSNs) have become the seat of researchers' attention recently due to their proficiency to explore underwater areas and design different applications for marine discovery and oceanic surveillance. One of the main objectives of each deployed underwater network is discovering the optimized path over sensor nodes to transmit the monitored data to onshore station. The process of transmitting data consumes energy of each node, while energy is limited in UWSNs. So energy efficiency is a challenge in underwater wireless sensor network. Dual sinks vector based forwarding (DS-VBF) takes both residual energy and location information into consideration as priority factors to discover an optimized routing path to save energy in underwater networks. The modified routing protocol employs dual sinks on the water surface which improves network lifetime. According to deployment of dual sinks, packet delivery ratio and the average end to end delay are enhanced. Based on our simulation results in comparison with VBF, average end to end delay reduced more than 80%, remaining energy increased 10%, and the increment of packet reception ratio was about 70%.
Resumo:
Introduction Chest pain is common in emergency department (ED) patients and represents a considerable burden for rural health services. Health services reforms to improve access to care need appropriately skilled and supported clinicians in the delivery of safe and effective care, including the use of emergency nurse practitioners (ENPs). Despite increasing use of ENPs, little is known about the safety and quality of the service in the rural ED context. The aims of this study are (1) to examine the safety and quality of the ENP service model in the provision of care in the rural environment and (2) to evaluate the effectiveness of the service in the management of patients presenting with undifferentiated chest pain. Methods and analysis This is the protocol for a prospective longitudinal nested cohort study to compare the effectiveness of ENP service with that of standard care. Adults presenting to three rural EDs in Queensland, Australia with a primary presenting complaint of atraumatic chest pain will be eligible for enrolment. We will measure (1) clinician's use of evidence-based guidelines (2) diagnostic accuracy of ECG interpretation for the management of patients with suspected or confirmed ACS (3) service indicators of waiting times, length-of-stay and did-not-wait rates and (4) clinician's diagnostic accuracy as measured by rates of unplanned representation within 7 days (5) satisfaction with care, (6) quality-of-life and (7) functional status. To assess these outcomes we will use a combination of measures collected from routinely collected data, medical record review and questionnaires (with 30-day follow-up). Ethics and dissemination Queensland Health Human Research Ethics Committee (HREC) has approved this protocol. The results will be published in peer-reviewed scientific journals and presented at one or more scientific conferences.
Resumo:
The objective of this review is to identify the effectiveness of education or behavioral interventions on adherence to phosphate control in adults with end stage kidney disease (ESKD) receiving hemodialysis (HD).
Resumo:
Background Despite the burden of acute respiratory illnesses (ARI) among Aboriginal and Torres Strait Islander children being a substantial cause of childhood morbidity and associated costs to families, communities and the health system, data on disease burden in urban children are lacking. Consequently evidence-based decision-making, data management guidelines, health resourcing for primary health care services and prevention strategies are lacking. This study aims to comprehensively describe the epidemiology, impact and outcomes of ARI in urban Aboriginal and Torres Strait Islander children (hereafter referred to as Indigenous) in the greater Brisbane area. Methods/design A prospective cohort study of Indigenous children aged less than five years registered with a primary health care service in Northern Brisbane, Queensland, Australia. Children are recruited at time of presentation to the service for any reason. Demographic, epidemiological, risk factor, microbiological, economic and clinical data are collected at enrolment. Enrolled children are followed for 12 months during which time ARI events, changes in child characteristics over time and monthly nasal swabs are collected. Children who develop an ARI with cough as a symptom during the study period are more intensely followed-up for 28(±3) days including weekly nasal swabs and parent completed cough diary cards. Children with persistent cough at day 28 post-ARI are reviewed by a paediatrician. Discussion Our study will be one of the first to comprehensively evaluate the natural history, epidemiology, aetiology, economic impact and outcomes of ARIs in this population. The results will inform studies for the development of evidence-based guidelines to improve the early detection, prevention and management of chronic cough and setting of priorities in children during and after ARI.
Resumo:
Background Sleep disorders are very common in the community and are estimated to affect up to 45% of the world’s population. Pharmacists are in a position to give advice and provide appropriate services to individuals who are unable to easily access medical care. The purpose of this study is to develop an intervention to improve the management of sleep disorders in the community. The aims are: (1) to evaluate the effectiveness of a community pharmacy-based intervention in managing sleep disorders; (2) to evaluate the role of actigraph as an objective measure in monitoring certain sleep disorders, and; (3) to evaluate the extended role of community pharmacists in managing sleep disorders. This intervention is developed to monitor individuals undergoing treatment and overcome the difficulties in validating self-reported feedback. Method/design This is a community-based intervention, prospective, controlled trial, with one intervention group and one control group, comparing individuals receiving a structured intervention with those receiving usual care for sleep-related disorders at community pharmacies. Discussion This study will demonstrate the utilisation and efficacy of community pharmacy-based intervention to manage sleep disorders in the community, and will assess the possibility of implementing this intervention into the community pharmacy workflow.
Resumo:
Background Dementia is a chronic illness without cure or effective treatment, which results in declining mental and physical function and assistance from others to manage activities of daily living. Many people with dementia live in long term care facilities, yet research into their quality of life (QoL) was rare until the last decade. Previous studies failed to incorporate important variables related to the facility and care provision or to look closely at the daily lives of residents. This paper presents a protocol for a comprehensive, multi-perspective assessment of QoL of residents with dementia living in long term care in Australia. A secondary aim is investigating the effectiveness of self-report instruments for measuring QoL. Methods The study utilizes a descriptive, mixed methods design to examine how facility, care staff, and resident factors impact QoL. Over 500 residents with dementia from a stratified, random sample of 53 facilities are being recruited. A sub-sample of 12 residents is also taking part in qualitative interviews and observations. Conclusions This national study will provide a broad understanding of factors underlying QoL for residents with dementia in long term care. The present study uses a similar methodology to the US-based Collaborative Studies of Long Term Care (CS-LTC) Dementia Care Study, applying it to the Australian setting.