435 resultados para Lower Semicontinuous Function
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2 13. In addition, we show the hashing algorithm can be distinguishable from a truly random sequence with probability close to one.
Resumo:
In this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function constructions based on block ciphers. Further, we prove the lower bound for finding a pair that follows some truncated differential in case of a random permutation. Then we present open-key differential distinguishers for some well known round-reduced block ciphers.
Resumo:
The position(s) of carbon-carbon double bonds within lipids can dramatically affect their structure and reactivity and thus has a direct bearing on biological function. Commonly employed mass spectrometric approaches to the characterization of complex lipids, however, fail to localize sites of unsaturation within the molecular structure and thus cannot distinguish naturally occurring regioisomers. In a recent communication \[Thomas, M. C.; Mitchell, T. W.; Blanksby, S. J. J. Am. Chem. Soc. 2006, 128, 58-59], we have presented a new technique for the elucidation of double bond position in glycerophospholipids using ozone-induced fragmentation within the source of a conventional electrospray ionization mass spectrometer. Here we report the on-line analysis, using ozone electrospray mass spectrometry (OzESI-MS), of a broad range of common unsaturated lipids including acidic and neutral glycerophospholipids, sphingomyelins, and triacylglycerols. All lipids analyzed are found to form a pair of chemically induced fragment ions diagnostic of the position of each double bond(s) regardless of the polarity, the number of charges, or the adduction (e.g., \[M - H](-), \[M - 2H](2-), \[M + H](+), \[M + Na](+), \[M + NH4](+)). The ability of OzESI-MS to distinguish lipids that differ only in the position of the double bonds is demonstrated using the glycerophosphocholine standards, GPCho(9Z-18:1/9Z-18:1) and GPCho(6Z-18:1/6Z-18:1). While these regioisomers cannot be differentiated by their conventional tandem mass spectra, the OzESI-MS spectra reveal abundant fragment ions of distinctive mass-to-charge ratio (m/z). The approach is found to be sufficiently robust to be used in conjunction with the m/z 184 precursor ion scans commonly employed for the identification of phosphocholine-containing lipids in shotgun lipidomic analyses. This tandem OzESI-MS approach was used, in conjunction with conventional tandem mass spectral analysis, for the structural characterization of an unknown sphingolipid in a crude lipid extract obtained from a human lens. The OzESI-MS data confirm the presence of two regioisomers, namely, SM(d18:0/15Z-24:1) and SM(d18:0/17Z-24:1), and suggest the possible presence of a third isomer, SM(d18:0/19Z-24:1), in lower abundance. The data presented herein demonstrate that OzESI-MS is a broadly applicable, on-line approach for structure determination and, when used in conjunction with established tandem mass spectrometric methods, can provide near complete structural characterization of a range of important lipid classes. As such, OzESI-MS may provide important new insight into the molecular diversity of naturally occurring lipids.
Resumo:
Current military conflicts are characterized by the use of the improvised explosive device. Improvements in personal protection, medical care, and evacuation logistics have resulted in increasing numbers of casualties surviving with complex musculoskeletal injuries, often leading to lifelong disability. Thus, there exists an urgent requirement to investigate the mechanism of extremity injury caused by these devices in order to develop mitigation strategies. In addition, the wounds of war are no longer restricted to the battlefield; similar injuries can be witnessed in civilian centers following a terrorist attack. Key to understanding such mechanisms of injury is the ability to deconstruct the complexities of an explosive event into a controlled, laboratory-based environment. In this article, a traumatic injury simulator, designed to recreate in the laboratory the impulse that is transferred to the lower extremity from an anti-vehicle explosion, is presented and characterized experimentally and numerically. Tests with instrumented cadaveric limbs were then conducted to assess the simulator’s ability to interact with the human in two mounting conditions, simulating typical seated and standing vehicle passengers. This experimental device will now allow us to (a) gain comprehensive understanding of the load-transfer mechanisms through the lower limb, (b) characterize the dissipating capacity of mitigation technologies, and (c) assess the bio-fidelity of surrogates.
Resumo:
Lower extremities are particularly susceptible to injury in an under‐vehicle explosion. Operational fitness of military vehicles is assessed through anthropometric test devices (ATDs) in full‐scale blast tests. The aim of this study was to compare the response between the Hybrid‐III ATD, the MiL‐Lx ATD and cadavers in our traumatic injury simulator, which is able to replicate the response of the vehicle floor in an under‐vehicle explosion. All specimens were fitted with a combat boot and tested on our traumatic injury simulator in a seated position. The load recorded in the ATDs was above the tolerance levels recommended by NATO in all tests; no injuries were observed in any of the 3 cadaveric specimens. The Hybrid‐III produced higher peak forces than the MiL‐Lx. The time to peak strain in the calcaneus of the cadavers was similar to the time to peak force in the ATDs. Maximum compression of the sole of the combat boot was similar for cadavers and MiL‐Lx, but significantly greater for the Hybrid‐III. These results suggest that the MiL‐Lx has a more biofidelic response to under‐vehicle explosive events compared to the Hybrid‐III. Therefore, it is recommended that mitigation strategies are assessed using the MiL‐Lx surrogate and not the Hybrid‐III.
Resumo:
The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the intersection. More specifically, it discloses its lower bound. By using the Lagrange interpolation we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. The protocol applies a verification test to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are first ones that have been designed without a generic secure function evaluation. More importantly, they are the most efficient protocols for private disjointness tests for the malicious adversary case.
Resumo:
A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream nalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.
Resumo:
Introduction Female sexual functioning is affected by a range of factors including motivation, psychological well-being, and relationship issues. In understanding female sexual dysfunction (FSD), there has been a tendency to privilege diagnostic and medical over relationship issues. Aim To investigate the association between women’s experience of intimacy in close relationships - operationalized in terms of attachment and degree of differentiation of self - and FSD. Methods Two hundred and thirty sexually active Australian women responded to an invitation to complete a set of validated scales to assess potential correlates of sexual functioning. Main Outcome Measures The Female Sexuality Function Index, the Experiences in Close Relationships Scale, the Differentiation of Self Inventory, as well as a set of study-specific questions were subject to hierarchical multiple regression analyses Results Relational variables of attachment avoidance and to a lesser degree, attachment anxiety were associated with FSD. Participants with lower levels of differentiation of self were more likely to report sexual difficulties. The inability to maintain a sense of self in the presence of intimate others was the strongest predictors of sexual problems. A history of sexual abuse in adulthood and higher levels of psychological distress were also associated with sexual difficulties. Conclusions The findings provide support for a relational understanding of female sexual functioning. Attachment avoidance, attachment anxiety, and degree of differentiation of self are shown to be associated with sexual difficulties. The findings support the need to focus on relational and psychological factors in women’s experience of sex.
Resumo:
This study explored how the social context influences the stress-buffering effects of social support on employee adjustment. It was anticipated that the positive relationship between support from colleagues and employee adjustment would be more marked for those strongly identifying with their work team. Furthermore, as part of a three-way interactive effect, it was predicted that high identification would increase the efficacy of coworker support as a buffer of two role stressors (role overload and role ambiguity). One hundred and 55 employees recruited from first-year psychology courses enrolled at two Australian universities were surveyed. Hierarchical multiple regression analyses revealed that the negative main effect of role ambiguity on job satisfaction was significant for those employees with low levels of team identification, whereas high team identifiers were buffered from the deleterious effect of role ambiguity on job satisfaction. There also was a significant interaction between coworker support and team identification. The positive effect of coworker support on job satisfaction was significant for high team identifiers, whereas coworker support was not a source of satisfaction for those employees with low levels of team identification. A three-way interaction emerged among the focal variables in the prediction of psychological well-being, suggesting that the combined benefits of coworker support and team identification under conditions of high demand may be limited and are more likely to be observed when demands are low.
Resumo:
The photoelectron spectrum of the oxyallyl (OXA) radical anion has been measured. The radical anion has been generated in the reaction of the atomic oxygen radical anion (O center dot-) with acetone. Three low-lying electronic states of OXA have been observed in the spectrum. Electronic structure calculations have been performed for the triplet states (B-3(2) and B-3(1)) of OXA and the ground doublet state ((2)A(2)) of the radical anion using density, functional theory (DFT). Spectral simulations have been carried out for the triplet statics based on the results of the DFT calculations. The simulation identifies a vibrational progression of the CCC bending mode of the B-3(2) state of OXA in the lower electron binding energy (eBE) portion of the spectrum. On top of the B-3(2) feature, however, the experimental spectrum exhibits additional photoelectron peaks whose angular distribution is distinct from that for the vibronic peaks of the B-3(2) state. Complete active space self-consistent field (CASSCF) method and second-order perturbation theory based on the CASSCF wave function (CASPT2) have been employed to study the lowest singlet state ((1)A(1)) of OXA. The simulation based on the results of these electronic structure calculations establishes that the overlapping peaks represent the vibrational ground level of the (1)A(1) state and its vibrational progression of the CO stretching mode. The A, state is the lowest electronic state of,OXA, and the electron affinity (EA) of OXA is 1.940 +/- 0.010 eV. The B-3(2) state is the first excited state with an electronic term energy of 55 +/- 2 meV. The widths of the vibronic peaks of the (X) over tilde (1)A(1) state are much broader than those of the (a) over tilde B-3(2) state, implying that the (1)A(1) state is indeed a transition state. The CASSCF and CASPT2 calculations suggest that the (1)A(1) state is at a potential maximum along the nuclear coordinate representing disrotatory motion of the two methylene groups, which leads to three-membered-ring formation, i.e., cydopropanone. The simulation of (b) over tilde B-3(1) OXA reproduces the higher eBE portion of the spectrum very well. The term energy of the B-3(1) state is 0.883 +/- 0.012 eV. Photoelectron spectroscopic measurements have also been conducted for the other ion products of the O center dot- reaction with acetone. The photoelectron imaging spectrum of the acetylcarbene (AC) radical anion exhibits a broad, structureless feature, which is assigned to the (X) over tilde (3)A '' state of AC. The ground ((2)A '') and first excited ((2)A') states of the 1-methylvinoxy (1-MVO) radical have been observed in the photoelectron spectrum of the 1-MVO ion, and their vibronic structure has been analyzed.
Resumo:
Mammographic density (MD) adjusted for age and body mass index (BMI) is a strong heritable breast cancer risk factor; however, its biological basis remains elusive. Previous studies assessed MD-associated histology using random sampling approaches, despite evidence that high and low MD areas exist within a breast and are negatively correlated with respect to one another. We have used an image-guided approach to sample high and low MD tissues from within individual breasts to examine the relationship between histology and degree of MD. Image-guided sampling was performed using two different methodologies on mastectomy tissues (n = 12): (1) sampling of high and low MD regions within a slice guided by bright (high MD) and dark (low MD) areas in a slice X-ray film; (2) sampling of high and low MD regions within a whole breast using a stereotactically guided vacuum-assisted core biopsy technique. Pairwise analysis accounting for potential confounders (i.e. age, BMI, menopausal status, etc.) provides appropriate power for analysis despite the small sample size. High MD tissues had higher stromal (P = 0.002) and lower fat (P = 0.002) compositions, but no evidence of difference in glandular areas (P = 0.084) compared to low MD tissues from the same breast. High MD regions had higher relative gland counts (P = 0.023), and a preponderance of Type I lobules in high MD compared to low MD regions was observed in 58% of subjects (n = 7), but did not achieve significance. These findings clarify the histologic nature of high MD tissue and support hypotheses regarding the biophysical impact of dense connective tissue on mammary malignancy. They also provide important terms of reference for ongoing analyses of the underlying genetics of MD.
Resumo:
The aim of this study was to examine the reliability and validity of field tests for assessing physical function in mid-aged and young-old people (55-70 y). Tests were selected that required minimal space and equipment and could be implemented in multiple field settings such as a general practitioner's office. Nineteen participants completed 2 field and I laboratory testing sessions. Intra-class correlations showed good reliability for the tests of upper body strength (lift and reach, R=.66), lower body strength (sit to stand, R=.80) and functional capacity (Canadian Step Test, R=.92), but not for leg power (single timed chair rise, R=.28). There was also good reliability for the balance test during 3 stances: parallel (94.7% agreement), semi-tandem (73.7%), and tandem (52.6%). Comparison of field test results with objective laboratory measures found good validity for the sit to stand (cf 1RM leg press, Pearson r=.68, p <.05), and for the step test (cf PWC140, r = -.60, p <.001), but not for the lift and reach (cf 1RM bench press, r=.43, p >.05), balance (r=-.13, -.18, .23) and rate of force development tests (r=-.28). It was concluded that the lower body strength and cardiovascular function tests were appropriate for use in field settings with mid-aged and young-old adults.