291 resultados para Cryptographic key
Resumo:
Though popular, concepts such as Toffler's 'prosumer' (1970; 1980; 1990) are inherently limited in their ability to accurately describe the makeup and dynamics of current co-creative environments, from fundamentally non-profit initiatives like the Wikipedia to user-industry partnerships that engage in crowdsourcing and the development of collective intelligence. Instead, the success or failure of such projects can be understood best if the traditional producer/consumer divide is dissolved, allowing for the emergence of the produser (Bruns, 2008). A close investigation of leading spaces for produsage makes it possible to extract the key principles which underpin and guide such content co-creation, and to identify how innovative pro-am partnerships between commercial entities and user communities might be structured in order to maximise the benefits that both sides will be able to draw from such collaboration. This chapter will outline these principles, and point to successes and failures in applying them to pro- am initiatives.
Resumo:
This paper offers a definition of elite media arguing their content focus will sufficiently meet social responsibility needs of democracy. Its assumptions come from the Finkelstein and Leveson Inquiries and regulatory British Royal Charter (2013). These provide guidelines on how media outlets meet ‘social responsibility’ standards, e.g. press has a ‘responsibility to be fair and accurate’ (Finkelstein); ethical press will feel a responsibility to ‘hold power to account’ (Leveson); news media ‘will be held strictly accountable’ (RC). The paper invokes the British principle of media opting-in to observe standards, and so serve the democracy. It will give examples from existing media, and consider social responsibility of media more generally. Obvious cases of ‘quality’ media: public broadcasters, e.g. BBC, Al-Jazeera, and ‘quality’ press, e.g. NYT, Süddeutscher Zeitung, but also community broadcasters, specialised magazines, news agencies, distinctive web logs, and others. Where providing commentary, these abjure gratuitous opinion -- meeting a standard of reasoned, informational and fair. Funding is almost a definer, many such services supported by the state, private trusts, public institutions or volunteering by staff. Literature supporting discussion on elite media will include their identity as primarily committed to a public good, e.g. the ‘Public Value Test’, Moe and Donders (2011); with reference also to recent literature on developing public service media. Within its limits the paper will treat social media as participants among all media, including elite, and as a parallel dimension of mass communication founded on inter-activity. Elite media will fulfil the need for social responsibility, firstly by providing one space, a ‘plenary’ for debate. Second is the notion of building public recognition of elite media as trustworthy. Third is the fact that elite media together are a large sector with resources to sustain social cohesion and debate; notwithstanding pressure on funds, and impacts of digital transformation undermining employment in media more than in most industries.
Resumo:
Over recent years, the health, transport and environment sectors have been increasingly focused on the promotion of transport cycling. From a health perspective, transport cycling is recognised as a beneficial form of physical activity as it can be easily integrated into daily living, is done at an intensity that confers health benefits, and is associated with reductions in mortality and morbidity [1]. From a safety perspective, the risk of a serious cycling injury decreases as cycling increases [2] as having more cyclists on roads increases motor vehicle drivers’ awareness of cyclists and in turn makes cycling safer. Whereas cycling for recreation is the fourth most commonly reported physical activity among Australian adults [3], transport cycling is an underutilised travel mode. Approximately 1.3% of journeys to work in Australia are made by bicycle [4]. This low prevalence is mirrored in the UK and the US, but not in some European countries like the Netherlands and Denmark, where over 18% and 26%, respectively, of all journeys are made by bicycle [5]. In the past decade, concerted efforts have been made by Australian state and local governments to increase cycling rates [6]. Notably, Melbourne, Sydney and Brisbane have implemented policies, increased bicycle commuting infrastructure, and offered information and promotion programs to encourage commuter cycling [6,7]. Governments have also developed comprehensive longterm plans for guiding future cycling strategies, using lessons learned from around the world in developing successful cycling policy and promotion [6,7]. Changes in transport cycling rates in inner cities since these efforts have been implemented are encouraging. In Sydney, census data indicate an 83% increase in the number of people using a bicycle for commuting between 2001 and 2011 [8]. Counts of bicycles being ridden along major cycling commuter routes indicate increases in weekday morning cycling trips in Brisbane (63% increase from 2004 to 2010) [7] and in Melbourne (a 43% increase from 2006 to 2008) [9]. However, bicycle mode share to work has changed little: for example, between 2001 and 2011, it decreased slightly from 1.6% to 1.3% in Brisbane [10,11]. Researchers have been investigating factors that may be contributing to low rates of cycling for transport, to inform future policy and programming to encourage transport cycling. The aim of this paper is to overview our work to date in this area of research in Queensland.
Resumo:
For the past few years, research works on the topic of secure outsourcing of cryptographic computations has drawn significant attention from academics in security and cryptology disciplines as well as information security practitioners. One main reason for this interest is their application for resource constrained devices such as RFID tags. While there has been significant progress in this domain since Hohenberger and Lysyanskaya have provided formal security notions for secure computation delegation, there are some interesting challenges that need to be solved that can be useful towards a wider deployment of cryptographic protocols that enable secure outsourcing of cryptographic computations. This position paper brings out these challenging problems with RFID technology as the use case together with our ideas, where applicable, that can provide a direction towards solving the problems.
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.
Resumo:
In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.
Resumo:
A popular lexicon for announcing partnerships within aviation is being ‘on-board’. Like boarding a plane, business partnerships requires trust in the expertise and the philosophy of another organisation. This paper reports upon the process and findings from the completion of a customer engagement project within a leading Australian Airport, as part of the wider uptake of design-led innovation. The project was completed bilaterally with Airport Corporation and prominent retail business partner undertaking a design-led approach to collaboratively explore an observed market trend affecting the performance of both businesses. A design-led catalyst facilitated the completion of this project, working within the Airport Corporation to disseminate the skills and philosophy of design over an 18 month period using an action research method. Findings reveal that the working environment necessary for design to be utilised requires; trust in the design-led approach as a new and exploratory way of completing work; leadership within the execution and delivery of project deliverables, and; a shared intrinsic motivation to develop new skills through a design-led approach which challenges a business-as-usual mentality (BAU). Design-led innovation can be deployed specifically to strengthen business partnerships through collaborative and explorative customer engagement.
Resumo:
A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.
Resumo:
Individuals with limb amputation fitted with conventional socket-suspended prostheses often experience socket-related discomfort leading to a significant decrease in quality of life. Bone-anchored prostheses are increasingly acknowledged as viable alternative method of attachment of artificial limb. In this case, the prosthesis is attached directly to the residual skeleton through a percutaneous fixation. To date, a few osseointegration fixations are commercially available. Several devices are at different stages of development particularly in Europe and the US.[1-15] Clearly, surgical procedures are currently blooming worldwide. Indeed, Australia and Queensland in particular have one of the fastest growing populations. Previous studies involving either screw-type implants or press-fit fixations for bone-anchorage have focused on fragmented biomechanics aspects as well as the clinical benefits and safety of the procedure. [16-25] However, very few publications have synthetized this information and provided an overview of the current developments in bone-anchored prostheses worldwide, let alone in Australia. The purposes of the presentation will be: 1. To provide an overview of the state-of-art developments in bone-anchored prostheses with as strong emphasis on the design of fixations, treatment, benefits, risks as well as future opportunities and challenges, 2. To present the current international developments of procedures for bone-anchored prostheses in terms of numbers of centers, number of cases and typical case-mix, 3. To highlight the current role Australia is playing as a leader worldwide in terms of growing population, broadest range of case-mix, choices of fixations, development of reimbursement schemes, unique clinical outcome registry for evidence-based practice, cutting-edge research, consumer demand and general public interest.
Resumo:
Peggy Shaw’s RUFF, (USA 2013) and Queensland Theatre Company’s collaboration with Queensland University of Technology, Total Dik!, (Australia 2013) overtly and evocatively draw on an aestheticized use of the cinematic techniques and technologies of Chroma Key to reveal the tensions in their production and add layers to their performances. In doing so they offer invaluable insight where the filmic and theatrical approaches overlap. This paper draws on Eckersall, Grehan and Scheer’s New Media Dramaturgy (2014) to reposition the frame as a contribution to intermedial theatre and performance practices in light of increasing convergence between seemingly disparate discourses. In RUFF, the scenic environment replicates a chroma-key ‘studio’ which facilitates the reconstruction of memory displaced after a stroke. RUFF uses the screen and projections to recall crooners, lounge singers, movie stars, rock and roll bands, and an eclectic line of eccentric family members living inside Shaw. While the show pays tribute to those who have kept her company across decades of theatrical performance, use of non-composited chroma-key technique as a theatrical device and the work’s taciturn revelation of the production process during performance, play a central role in its exploration of the juxtaposition between its reconstructed form and content. In contrast Total Dik! uses real-time green screen compositing during performance as a scenic device. Actors manipulate scale models, refocus cameras and generate scenes within scenes in the construction of the work’s examination of an isolated Dictator. The ‘studio’ is again replicated as a site for (re)construction, only in this case Total Dik! actively seeks to reveal the process of production as the performance plays out. Building on RUFF, and other works such as By the Way, Meet Vera Stark, (2012) and Hotel Modern’s God’s Beard (2012), this work blends a convergence of mobile technologies, models, and green screen capture to explore aspects of transmedia storytelling in a theatrical environment (Jenkins, 2009, 2013). When a green screen is placed on stage, it reads at once as metaphor and challenge to the language of theatre. It becomes, or rather acts, as a ‘sign’ that alludes to the nature of the reconstructed, recomposited, manipulated and controlled. In RUFF and in Total Dik!, it is also a place where as a mode of production and subsequent reveal, it adds weight to performance. These works are informed by Auslander (1999) and Giesenkam (2007) and speak to and echo Lehmann’s Postdramatic Theatre (2006). This paper’s consideration of the integration of studio technique and live performance as a dynamic approach to multi-layered theatrical production develops our understanding of their combinatory use in a live performance environment.
Resumo:
As negative employee attitudes towards alcohol and other drug (AOD) policies may have serious consequences for organizations, the present study examined demographic and attitudinal dimensions leading to employees’ perceptions of AOD policy effectiveness. Survey responses were obtained from 147 employees in an Australian agricultural organization. Three dimensions of attitudes towards AOD policies were examined: knowledge of policy features, attitudes towards testing, and preventative measures such as job design and organizational involvement in community health. Demographic differences were identified, with males and blue-collar employees reporting significantly more negative attitudes towards the AOD policy. Attitude dimensions were stronger predictors of perceptions of policy effectiveness than demographics, and the strongest predictor was preventative measures. This suggests that organizations should do more than design adequate and fair AOD policies, and take a more holistic approach to AOD impairment by engaging in workplace design to reduce AOD use and promote a consistent health message to employees and the community.
Resumo:
Individuals with limb amputation fitted with conventional socket-suspended prostheses often experience socket related discomfort leading to a significant decrease in quality of life. Most of these concerns can be overcome by surgical techniques enabling bone-anchored prostheses. In this case, the prosthesis is attached directly to the residual skeleton through a percutaneous implant. The aim of this study is to present the current advances in these surgical techniques worldwide with a strong focus on the developments in Australia and Queensland.