291 resultados para Cryptographic key
Resumo:
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
B-Raf is one of the more commonly mutated proto-oncogenes implicated in the development of cancers. In this review, we consider the mechanisms and clinical impacts of B-Raf mutations in cancer and discuss the implications for the patient in melanoma, thyroid cancer and colorectal cancer, where B-Raf mutations are particularly common.
Resumo:
In 2001, the red imported fire ant (Solenopsis invicta Buren) was identified in Brisbane, Australia. An eradication program involving broadcast bait treatment with two insect growth regulators and a metabolic inhibitor began in September of that year and is currently ongoing. To gauge the impacts of these treatments on local ant populations, we examined long-term monitoring data and quantified abundance patterns of S. invicta and common local ant genera using a linear mixed-effects model. For S. invicta, presence in pitfalls reduced over time to zero on every site. Significantly higher numbers of S. invicta workers were collected on high-density polygyne sites, which took longer to disinfest compared with monogyne and low-density polygyne sites. For local ants, nine genus groups of the 10 most common genera analyzed either increased in abundance or showed no significant trend. Five of these genus groups were significantly less abundant at the start of monitoring on high-density polygyne sites compared with monogyne and low-density polygyne sites. The genus Pheidole significantly reduced in abundance over time, suggesting that it was affected by treatment efforts. These results demonstrate that the treatment regime used at the time successfully removed S. invicta from these sites in Brisbane, and that most local ant genera were not seriously impacted by the treatment. These results have important implications for current and future prophylactic treatment efforts, and suggest that native ants remain in treated areas to provide some biological resistance to S. invicta.
Resumo:
Live migration of multiple Virtual Machines (VMs) has become an integral management activity in data centers for power saving, load balancing and system maintenance. While state-of-the-art live migration techniques focus on the improvement of migration performance of an independent single VM, only a little has been investigated to the case of live migration of multiple interacting VMs. Live migration is mostly influenced by the network bandwidth and arbitrarily migrating a VM which has data inter-dependencies with other VMs may increase the bandwidth consumption and adversely affect the performances of subsequent migrations. In this paper, we propose a Random Key Genetic Algorithm (RKGA) that efficiently schedules the migration of a given set of VMs accounting both inter-VM dependency and data center communication network. The experimental results show that the RKGA can schedule the migration of multiple VMs with significantly shorter total migration time and total downtime compared to a heuristic algorithm.
Resumo:
This paper examines the frame as it contributes to the debate on contemporary intermedial theatre and performance practices in light of increasing astriction between filmic and theatrical discourses. Informed by Auslander (1999), Lehmann (2006), and Giesekam (2007), and through an extrapolation of the tenets Eckersall, Gretchen and Scheer identify in the theory of New Media Dramaturgy, it will analyse two recent works of experimental theatre-making. RUFF (2013), a New York produced solo performance by one of the world’s leading female performers, explores her experiences of having a stroke. Total Dik! (2013), produced in Brisbane, Australia, is an interdisciplinary collaborative performance that examines aspects of dictatorship. They are clearly very different works yet there are a number of significant theatrical similarities in their use of Chroma Key technology and live compositing as material scenic devices. These works overtly and evocatively draw on the cinematic technique and technology of Chroma Key to augment and reveal the tensions and overlaps in their production processes.
Resumo:
Equitable claims now increasingly arise in Australian estate litigation, particularly in conjunction with family provision applications.
Resumo:
Since its discovery in 1991, the bacterial periplasmic oxidative folding catalyst DsbA has been the focus of intense research. Early studies addressed why it is so oxidizing and how it is maintained in its less stable oxidized state. The crystal structure of Escherichia coli DsbA (EcDsbA) revealed that the oxidizing periplasmic enzyme is a distant evolutionary cousin of the reducing cytoplasmic enzyme thioredoxin. Recent significant developments have deepened our understanding of DsbA function, mechanism, and interactions: the structure of the partner membrane protein EcDsbB, including its complex with EcDsbA, proved a landmark in the field. Studies of DsbA machineries from bacteria other than E. coli K-12 have highlighted dramatic differences from the model organism, including a striking divergence in redox parameters and surface features. Several DsbA structures have provided the first clues to its interaction with substrates, and finally, evidence for a central role of DsbA in bacterial virulence has been demonstrated in a range of organisms. Here, we review current knowledge on DsbA, a bacterial periplasmic protein that introduces disulfide bonds into diverse substrate proteins and which may one day be the target of a new class of anti-virulence drugs to treat bacterial infection. Antioxid. Redox Signal. 14, 1729–1760.
Resumo:
Governments, authorities, and organisations dedicate significant resources to encourage communities to prepare for and respond to natural hazards such as cyclones, earthquakes, floods, and bushfires. However, recent events, media attention, and ongoing academic research continue to highlight cases of non-compliance including swift water rescues. Individuals who fail to comply with instructions issued during natural hazards significantly impede the emergency response because they divert resources to compliance-enforcement and risk the lives of emergency service workers who may be required to assist them. An initial investigation of the field suggests several assumptions or practices that influence emergency management policy, communication strategy, and community behaviours during natural hazards: 1) that community members will comply with instructions issued by governments and agencies that represent the most authoritative voice, 2) that communication campaigns are shaped by intuition rather than evidence-based approaches (Wood et al., 2012), and 3) that emergency communication is linear and directional. This extended abstract represents the first stage of a collaborative research project that integrates industry and cross-disciplinary perspectives to provide evidence-based approaches for emergency and risk communication during the response and recovery phases of a natural hazard. Specifically, this abstract focuses on the approach taken and key elements that will form the development of a typology of compliance-gaining messages during the response phase of natural hazards, which will be the focus of the conference presentation.
Resumo:
This paper examins the relationship between firm performance and key board and audit committee variables in a sample of mid-tier listed Australian firms. Unlike the UK where the corporate governance Code specifically outlines special arrangements for companies outside the FTSE 350 index, the ASX Corporate Governance recommendations make no special provisions for mid-tier companies. Consequently, mid-tier Australian companies may be expending scarce resources in conforming with recommendations that are not value-creating.
Resumo:
This book is an introduction to key issues in the area of crime as it connects to society. The book is divided into three parts: Understanding Crime and Criminality: introduces topics such as the social construction of crime and deviance, social control, the fear of crime, poverty and exclusion, white collar crime, victims of crime, race/gender and crime. Types of Crime and Criminality: explores examples including human trafficking, sex work, drug crime, environmental crime, cyber crime, war crime, terrorism, and interpersonal violence. Responses to Crime: looks at areas such as crime and the media, policing, moral panics, deterrence, prisons and rehabilitation.
Resumo:
Bactrocera papayae Drew & Hancock, Bactrocera philippinensis Drew & Hancock, Bactrocera carambolae Drew & Hancock, and Bactrocera invadens Drew, Tsuruta & White are four horticultural pest tephritid fruit fly species that are highly similar, morphologically and genetically, to the destructive pest, the Oriental fruit fly, Bactrocera dorsalis (Hendel) (Diptera: Tephritidae). This similarity has rendered the discovery of reliable diagnostic characters problematic, which, in view of the economic importance of these taxa and the international trade implications, has resulted in ongoing difficulties for many areas of plant protection and food security. Consequently, a major international collaborative and integrated multidisciplinary research effort was initiated in 2009 to build upon existing literature with the specific aim of resolving biological species limits among B. papayae, B. philippinensis, B. carambolae, B. invadens and B. dorsalis to overcome constraints to pest management and international trade. Bactrocera philippinensis has recently been synonymized with B. papayae as a result of this initiative and this review corroborates that finding; however, the other names remain in use. While consistent characters have been found to reliably distinguish B. carambolae from B. dorsalis, B. invadens and B. papayae, no such characters have been found to differentiate the latter three putative species. We conclude that B. carambolae is a valid species and that the remaining taxa, B. dorsalis, B. invadens and B. papayae, represent the same species. Thus, we consider B. dorsalis (Hendel) as the senior synonym of B. papayae Drew and Hancock syn.n. and B. invadens Drew, Tsuruta & White syn.n. A redescription of B. dorsalis is provided. Given the agricultural importance of B. dorsalis, this taxonomic decision will have significant global plant biosecurity implications, affecting pest management, quarantine, international trade, postharvest treatment and basic research. Throughout the paper, we emphasize the value of independent and multidisciplinary tools in delimiting species, particularly in complicated cases involving morphologically cryptic taxa.