366 resultados para Boyd, Mike
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
Local communities are vulnerable to the potential environmental risks associated with construction activity. Currently, little is understood about how perceptions of environmental risks are shaped and spread within a community. A better understanding of this process can help bridge the gap between developers and communities and bring about more sustainable development practices. This paper reports a research methodology which uses social contagion theory to investigate this process. The research adopts a single case study approach of a highly controversial housing project in the greater Sydney metropolitan area. The case study is particularly significant as it investigates an extensive and on-going community-based protest campaign (dating back almost 20 years) that has generated the longest standing 24 hour community picket in the New South Wales.
Resumo:
The Texas Department of Transportation (TxDOT) is concerned about the widening gap between preservation needs and available funding. Funding levels are not adequate to meet the preservation needs of the roadway network; therefore projects listed in the 4-Year Pavement Management Plan must be ranked to determine which projects should be funded now and which can be postponed until a later year. Currently, each district uses locally developed methods to prioritize projects. These ranking methods have relied on less formal qualitative assessments based on engineers’ subjective judgment. It is important for TxDOT to have a 4-Year Pavement Management Plan that uses a transparent, rational project ranking process. The objective of this study is to develop a conceptual framework that describes the development of the 4-Year Pavement Management Plan. It can be largely divided into three Steps; 1) Network-Level project screening process, 2) Project-Level project ranking process, and 3) Economic Analysis. A rational pavement management procedure and a project ranking method accepted by districts and the TxDOT administration will maximize efficiency in budget allocations and will potentially help improve pavement condition. As a part of the implementation of the 4-Year Pavement Management Plan, the Network-Level Project Screening (NLPS) tool including the candidate project identification algorithm and the preliminary project ranking matrix was developed. The NLPS has been used by the Austin District Pavement Engineer (DPE) to evaluate PMIS (Pavement Management Information System) data and to prepare a preliminary list of candidate projects for further evaluation.
Resumo:
The trucking industry has played a significant role in the economic growth in Texas by transporting and distributing commodities using commercial motor vehicles. The Texas Department of Transportation (TxDOT), however, has recognized that the large number of overweight trucks operating on the state highway system has resulted in the deterioration of pavement condition. In addition, the permit fee to carry higher loads above legal limits is much lower than the cost to treat the increase in pavement damage. The primary purpose of the research presented in this paper is to investigate current TxDOT overweight permit structures to support pavement management. The research team analyzed the TxDOT “1547” Over-axle Weight Tolerance Permit structure to support an increase in the fee structure, bringing it more in line with the actual pavement damage. The analysis showed that the revised overweight permit structure could provide an additional $9.3 million annually for pavement maintenance needs by increasing current permit fees. These results were supported by the 2030 Committee for recommendation to the Texas Transportation Commission and consideration by the State Legislature [1]. The research team recommends conducting further research to identify methods for working cooperatively with the trucking industry to develop improved methods for assessing weight damage relationships and developing more effective and accurate means for assessing overweight permit fees.
Resumo:
This paper presents a road survey as part of a workshop conducted by the Texas Department of Transportation (TxDOT) to evaluate and improve the maintenance practices of the Texas highway system. Directors of maintenance from six peer states (California, Kansas, Georgia, Missouri, North Carolina, and Washington) were invited to this 3-day workshop. One of the important parts of this workshop was a Maintenance Test Section Survey (MTSS) to evaluate a number of pre-selected one-mile roadway sections. The workshop schedule allowed half a day to conduct the field survey and 34 sections were evaluated. Each of the evaluators was given a booklet and asked to rate the selected road sections. The goals of the MTSS were to: 1. Assess the threshold level at which maintenance activities are required as perceived by the evaluators from the peer states; 2. Assess the threshold level at which maintenance activities are required as perceived by evaluators from other TxDOT districts; and 3. Perform a pilot evaluation of the MTSS concept. This paper summarizes the information obtained from survey and discusses the major findings based on a statistical analysis of the data and comments from the survey participants.
Resumo:
To assess and improve their practices, and thus ensure the future excellence of the Texas highway system, the Texas Department of Transportation (TxDOT) sought a forum in which experts from other State Departments of Transportation could evaluate the TxDOT maintenance program and practices based on their expertise. To meet this need, a Peer State Review of TxDOT Maintenance Practices project was organized and conducted by the Center for Transportation Research (CTR) at The University of Texas at Austin. CTR researchers, along with TxDOT staff, conducted a workshop to present TxDOT’s maintenance practices to the visiting peer reviewers and invite their feedback. Directors of maintenance from six different states—California, Kansas, Georgia, Missouri, North Carolina, and Washington—participated in the workshop. CTR and TxDOT worked together to design a questionnaire with 15 key questions to capture the peers’ opinions on maintenance program and practices. This paper compiles and summarizes this information. The examination results suggested that TxDOT should use a more state-wide approach to funding and planning, in addition to funding and planning for each district separately. Additionally, the peers recommended that criteria such as condition and level of service of the roadways be given greater weight in the funding allocation than lane miles or vehicle miles traveled (VMT). The Peer Reviewers also determined that TxDOT maintenance employee experience and communications were strong assets. Additional strengths included the willingness of TxDOT to invite peer reviews of their practices and a willingness to consider opportunities for improvement.
Resumo:
In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.
Resumo:
When compared with similar joint arthroplasties, the prognosis of Total Ankle Replacement (TAR) is not satisfactory although it shows promising results post surgery. To date, most models do not provide the full anatomical functionality and biomechanical range of motion of the healthy ankle joint. This has sparked additional research and evaluation of clinical outcomes in order to enhance ankle prosthesis design. However, the limited biomechanical data that exist in literature are based upon two-dimensional, discrete and outdated techniques1 and may be inaccurate. Since accurate force estimations are crucial to prosthesis design, a paper based on a new biomechanical modeling approach, providing three dimensional forces acting on the ankle joint and the surrounding tissues was published recently, but the identified forces were suspected of being under-estimated, while muscles were . The present paper reports an attempt to improve the accuracy of the analysis by means of novel methods for kinematic processing of gait data, provided in release 4.1 of the AnyBody Modeling System (AnyBody Technology, Aalborg, Denmark) Results from the new method are shown and remaining issues are discussed.
Resumo:
When compared with other arthoplasties, Total Ankle Joint Replacement (TAR) is much less successful. Attempts to remedy this situation by modifying the implant design, for example by making its form more akin to the original ankle anatomy, have largely met with failure. One of the major obstacles is a gap in current knowledge relating to ankle joint force. Specifically this is the lack of reliable data quantifying forces and moments acting on the ankle, in both the healthy and diseased joints. The limited data that does exist is thought to be inaccurate [1] and is based upon simplistic two dimensional discrete and outdated techniques.
Resumo:
The subtalar joint has been presumed to account for most of the pathologic motion in the foot and ankle, but research has shown that motion at other foot joints is greater than traditionally expected. Although recent research demonstrates the complexity of the kinematic variables in the foot and ankle, it still fails to expand our knowledge of the role of the musculotendinous structures in the biomechanics of the foot and ankle and how this is affected by in-shoe orthoses. The aim of this study was to simulate the effect of in-shoe foot orthoses by manipulation of the ground reaction force (GRF) components and centre of pressure (CoP) to demonstrate the resultant effect on muscle force in selected muscles during both the rearfoot loading response and stance phase of the gait cycle. We found that any medial wedge increases ankle joint load during gait cycle, while a lateral wedge decreases the joint load during the stance phase.
Resumo:
A self-escrowed public key infrastructure (SE-PKI) combines the usual functionality of a public-key infrastructure with the ability to recover private keys given some trap-door information. We present an additively homomorphic variant of an existing SE-PKI for ElGamal encryption. We also propose a new efficient SE-PKI based on the ElGamal and Okamoto-Uchiyama cryptosystems that is more efficient than the previous SE-PKI. This is the first SE-PKI that does not suffer from a key doubling problem of previous SE-PKI proposals. Additionally, we present the first self-escrowed encryption schemes secure against chosen-ciphertext attack in the standard model. These schemes are also quite efficient and are based on the Cramer-Shoup cryptosystem, and the Kurosawa-Desmedt hybrid variant in different groups.
Resumo:
This chapter applies emerging discourses of eco-crime and green criminology to issues of air pollution. Of course there are various forms of pollution, but this chapter will focus on the contamination and regulation of 'the air we breathe'.
Resumo:
This article focuses on government acts of intimidation or the "policing of knowledge". It is more concerned with the suppression of academic freedom, the contractual ambiguities of contemporary criminological research and the ways in which independent scholarship is controlled or influenced by funding bodies than with the specifics of the original crime prevention research which forms the basis of the case study.
Resumo:
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols.