25 resultados para Conglomerados de Vila de Rei
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
In a traditional anti-jamming system a transmitter who wants to send a signal to a single receiver spreads the signal power over a wide frequency spectrum with the aim of stopping a jammer from blocking the transmission. In this paper, we consider the case that there are multiple receivers and the transmitter wants to broadcast a message to all receivers such that colluding groups of receivers cannot jam the reception of any other receiver. We propose efficient coding methods that achieve this goal and link this problem to well-known problems in combinatorics. We also link a generalisation of this problem to the Key Distribution Pattern problem studied in combinatorial cryptography.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
This report provides an overview of the tornado impact on the safe operation and shutdown of nuclear power plants in the United States. The motivation for this review stems from the damage and failure of the Fukushima nuclear power plant on March 11, 2011. That disaster warrants comparison of the safety measures in place within the global nuclear power industry.
Level of contribution of intrinsic risk factors to the management of patients with plantar heel pain
Resumo:
Introduction: Injuries in the lower extremity are considered to have multifactorial causes, whilst people with heel pain represent the most frequent cause of visits to health professionals. Managing these patients can be very difficult. The purpose of this research is to identify key variables which can influence foot health in patients with heel pain. Materials and method: A cross-sectional observational study was carried out with a sample of sixty-two participants recruited from the Educational Welfare Unit of the University of Malaga. The therapists, blinded for the study, fill in the data with anthropometric information and the FPI, while participants fill in the foot health status questionnaire, FHSQ. The most significant results reveal that there is a moderate relation between the clinical variables and the FHSQ commands. The most significant contribution is the BMI in the foot health status questionnaire. Conclusion: The variables which can help manage clinical subjects with heel pain are age, BMI, footwear and FPI (left foot).
Resumo:
The zombie has long been regarded as a “fundamentally American creation” (Bishop 2010) and a western monster representing the fears and anxieties of Western society. Since the renaissance of the zombie movie in the early 2000s, a subsequent surge in international production has seen the release of movies from Norway, Cuba, Pakistan and Thailand to name a few. Although Japanese zombie movies have been far more visible for Western cult audiences than in mainstream markets, Japanese cinema has emerged as one of the more prolific producers of zombie films outside of Anglophone or Western European countries in recent years. Films such as Helldriver (2010), Zombie TV (2013), Versus (2000), Tokyo Zombie (2005), Happiness of the Katakuris (2001) and anime television series High School of the Dead (2010) have generated varying degrees of popularity and critical attention internationally. At first glance Japanese zombie films, with musical zombie interludes, undead yakuza henchmen and revenge-seeking yūrei zombies, appear fundamentally different to their Western counterparts. Yet, on closer examination, the Japanese zombie movie could be regarded as a hybrid and intertextual generic form drawing on syntactic conventions at the core of a universal zombie sub-genre established by Western filmmaking traditions, while also distilling culturally specific tropes unique to various Japanese horror cinema sub-genres. Most importantly, the Japanese zombie film extracts, emphasises and revises particular conventions and motifs common within Western zombie films that are particularly relevant to Japanese audiences. This chapter investigates the cultural resonance of key generic motifs identifiable in the Japanese zombie film. It establishes a production context and the influence of Japanese horror cinema on style and thematic concerns. It then examines the function of prominent narrative conventions, namely: the source, outbreak and spread of infection; mutation and the representation of the monster; and the inclusion of supernatural and religious motifs.
Resumo:
The identification of molecular networks at the system level in mammals is accelerated by next-generation mammalian genetics without crossing, which requires both the efficient production of whole-body biallelic knockout (KO) mice in a single generation and high-performance phenotype analyses. Here, we show that the triple targeting of a single gene using the CRISPR/Cas9 system achieves almost perfect KO efficiency (96%–100%). In addition, we developed a respiration-based fully automated noninvasive sleep phenotyping system, the Snappy Sleep Stager (SSS), for high-performance (95.3% accuracy) sleep/wake staging. Using the triple-target CRISPR and SSS in tandem, we reliably obtained sleep/wake phenotypes, even in double-KO mice. By using this system to comprehensively analyze all of the N-methyl-D-aspartate (NMDA) receptor family members, we found Nr3a as a short-sleeper gene, which is verified by an independent set of triple-target CRISPR. These results demonstrate the application of mammalian reverse genetics without crossing to organism-level systems biology in sleep research.
Resumo:
Migraine without aura is the most common form of migraine, characterized by recurrent disabling headache and associated autonomic symptoms. To identify common genetic variants associated with this migraine type, we analyzed genome-wide association data of 2,326 clinic-based German and Dutch individuals with migraine without aura and 4,580 population-matched controls. We selected SNPs from 12 loci with 2 or more SNPs associated with P values of <1 x 10(-5) for replication testing in 2,508 individuals with migraine without aura and 2,652 controls. SNPs at two of these loci showed convincing replication: at 1q22 (in MEF2D; replication P = 4.9 x 10(-4); combined P = 7.06 x 10(-11)) and at 3p24 (near TGFBR2; replication P = 1.0 x 10(-4); combined P = 1.17 x 10(-9)). In addition, SNPs at the PHACTR1 and ASTN2 loci showed suggestive evidence of replication (P = 0.01; combined P = 3.20 x 10(-8) and P = 0.02; combined P = 3.86 x 10(-8), respectively). We also replicated associations at two previously reported migraine loci in or near TRPM8 and LRP1. This study identifies the first susceptibility loci for migraine without aura, thereby expanding our knowledge of this debilitating neurological disorder.
Resumo:
The detailed molecular mechanisms underlying the regulation of sleep duration in mammals are still elusive. To address this challenge, we constructed a simple computational model, which recapitulates the electrophysiological characteristics of the slow-wave sleep and awake states. Comprehensive bifurcation analysis predicted that a Ca2+-dependent hyperpolarization pathway may play a role in slow-wave sleep and hence in the regulation of sleep duration. To experimentally validate the prediction, we generate and analyze 21 KO mice. Here we found that impaired Ca2+-dependent K+ channels (Kcnn2 and Kcnn3), voltage-gated Ca2+ channels (Cacna1g and Cacna1h), or Ca2+/calmodulin-dependent kinases (Camk2a and Camk2b) decrease sleep duration, while impaired plasma membrane Ca2+ ATPase (Atp2b3) increases sleep duration. Pharmacological intervention and whole-brain imaging validated that impaired NMDA receptors reduce sleep duration and directly increase the excitability of cells. Based on these results, we propose a hypothesis that a Ca2+-dependent hyperpolarization pathway underlies the regulation of sleep duration in mammals.