193 resultados para wireless universal serial-bus dongle


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The routine cultivation of human corneal endothelial cells, with the view to treating patients with endothelial dysfunction, remains a challenging task. While progress in this field has been buoyed by the proposed existence of progenitor cells for the corneal endothelium at the corneal limbus, strategies for exploiting this concept remain unclear. In the course of evaluating methods for growing corneal endothelial cells, we have noted a case where remarkable growth was achieved using a serial explant culture technique. Over the course of 7 months, a single explant of corneal endothelium, acquired from cadaveric human tissue, was sequentially seeded into 7 culture plates and on each occasion produced a confluent cell monolayer. Sample cultures were confirmed as endothelial in origin by positive staining for glypican-4. On each occasion, small cells, closest to the tissue explant, developed into a highly compact layer with an almost homogenous structure. This layer was resistant to removal with trypsin and produced continuous cell outgrowth during multiple culture periods. The small cells gave rise to larger cells with phase-bright cell boundaries and prominent immunostaining for both nestin and telomerase. Nestin and telomerase were also strongly expressed in small cells immediately adjacent to the wound site, following transfer of the explant to another culture plate. These findings are consistent with the theory that progenitor cells for the corneal endothelium reside within the limbus and provide new insights into expected expression patterns for nestin and telomerase within the differentiation pathway.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An analysis of the emissions from 14 CNG and 5 Diesel buses was conducted during April & May, 2006. Studies were conducted at both steady state and transient driving modes on a vehicle dynamometer utilising a CVS dilution system. This article will focus on the volatile properties of particles from 4 CNG and 4 Diesel vehicles from within this group with a priority given to the previously un-investigated CNG emissions produced at transient loads. Particle number concentration data was collected by three CPC’s (TSI 3022, 3010 & 3782WCPC) having D50 cut-offs set to 5nm, 10nm & 20nm respectively. Size distribution data was collected using a TSI 3080 SMPS with a 3025 CPC during the steady state driving modes. During transient cycles mono-disperse “slices” of between 5nm & 25nm were measured. The volatility of these particles was determined by placing a thermodenuder before the 3022 and the SMPS and measuring the reduction in particle number concentration as the temperature in the thermodenuder was increased. This was then normalised against the total particle count given by the 3010 CPC to provide high resolution information on the reduction in particle concentration with respect to temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis focuses on providing reliable data transmissions in large-scale industrial wireless sensor networks through improving network layer protocols. It addresses three major problems: scalability, dynamic industrial environments and coexistence of multiple types of data traffic in a network. Theoretical developments are conducted, followed by simulation studies for verification of theoretic results. The approach proposed in this thesis has been shown to be effective for large-scale network implementation and to provide improved data transmission reliability for both periodic and sporadic traffic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Airborne particulate pollutant is considered to be one of the major harmful emissions produced by vehicle engines as it has been directly linked to serious health problems. Passengers spend long times at bus stations and may be exposed to high concentrations of pollution. Particle pollution at two bus stations in Brisbane, Australia were monitored. The two bus stations consisted of markedly different site geography and surroundings with one situated in a street canyon and the other elevated above ground level. The same flow of traffic operated through both stations. Real time measurements of ultrafine particle concentration, size distribution and meteorological conditions were carried out on the platform continuously over several days. The results showed that the particle number concentrations were significantly different at the two stations, suggesting that the layout of site geometry and surroundings was a dominant determining factor through the injection of fresh air into the station platforms and the rates of dilution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study focuses on weather effects on daily bus ridership in Brisbane, given bus’ dominance in this city. The weather pattern of Brisbane varies by season according to its sub-tropical climate characteristics. Bus is prone to inclement weather condition as it shares the road system with general traffic. Moreover, bus stops generally offer less or sometimes no protection from adverse weather. Hence, adverse weather conditions such as rain are conjectured to directly impact on daily travel behaviour patterns. There has been limited Australian research on the impact of weather on daily transit ridership. This study investigates the relationship between rainy day and daily bus ridership for the period of 2010 to 2012. Overall, rainfall affects negatively with varying impacts on different transit groups. However, this analysis confirmed a positive relationship between consecutive rainy days (rain continuing for 3 or more days). A possible explanation could be that people may switch their transport mode to bus to avoid high traffic congestion and higher accident potentiality on rainy days. Also, Brisbane’s segregated busway (BRT) corridor works favourably towards this mode choice. Our study findings enhance the fundamental understanding of traveller behaviour, particularly mode choice behaviour under adverse weather conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For people with cognitive disabilities, technology is more often thought of as a support mechanism, rather than a source of division that may require intervention to equalize access across the cognitive spectrum. This paper presents a first attempt at formalizing the digital gap created by the generalization of search engines. This was achieved through the development of a mapping of cognitive abilities required by users to execute low- level tasks during a standard Web search task. The mapping demonstrates how critical these abilities are to successfully use search engines with an adequate level of independence. It will lead to a set of design guidelines for search engine interfaces that will allow for the engagement of users of all abilities, and also, more importantly, in search algorithms such as query suggestion and measure of relevance (i.e. ranking).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Safety is one of the major world health issues, and is even more acute for “vulnerable” road users, pedestrians and cyclists. At the same time, public authorities are promoting the active modes of transportation that involve these very users for their health benefits. It is therefore important to understand the factors and designs that provide the best safety for vulnerable road users and encourage more people to use these modes. Qualitative and quantitative shortcomings of collisions make it necessary to use surrogate measures of safety in studying these modes. Some interactions without a collision such as conflicts can be good surrogates of collisions as they are more frequent and less costly. To overcome subjectivity and reliability challenges, automatic conflict analysis using video cameras and deriving users’ trajectories is a solution to overcome shortcomings of manual conflict analysis. The goal of this paper is to identify and characterize various interactions between cyclists and pedestrians at bus stops along bike paths using a fully automated process. Three conflict severity indicators are calculated and adapted to the situation of interest to capture those interactions. A microscopic analysis of users’ behavior is proposed to explain interactions more precisely. Eventually, the study aims to show the capability of automatically collecting and analyzing data for pedestrian-cyclist interactions at bus stops along segregated bike paths in order to better understand the actual and perceived risks of these facilities.