820 resultados para Universal Design (UD)
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
Grid connected photovoltaic (PV) inverters fall into three broad categories - central, string and module integrated converters (MICs). MICs offer many advantages in performance and flexibility, but are at a cost disadvantage. Two alternative novel approaches proposed by the author - cascaded dc-dc MICs and bypass dc-dc MICs - integrate a simple non-isolated intelligent dc-dc converter with each PV module to provide the advantages of dc-ac MICs at a lower cost. A suitable universal 150 W 5 A dc-dc converter design is presented based on two interleaved MOSFET half bridges. Testing shows zero voltage switching (ZVS) keeps losses under 1 W for bi-directional power flows up to 15 W between two adjacent 12 V PV modules for the bypass application, and efficiencies over 94% for most of the operational power range for the cascaded converter application. Based on the experimental results, potential optimizations to further reduce losses are discussed.
Resumo:
Background Anxiety, depressive and substance use disorders account for three quarters of the disability attributed to mental disorders and frequently co-occur. While programs for the prevention and reduction of symptoms associated with (i) substance use and (ii) mental health disorders exist, research is yet to determine if a combined approach is more effective. This paper describes the study protocol of a cluster randomised controlled trial to evaluate the effectiveness of the CLIMATE Schools Combined intervention, a universal approach to preventing substance use and mental health problems among adolescents. Methods/design Participants will consist of approximately 8400 students aged 13 to 14-years-old from 84 secondary schools in New South Wales, Western Australia and Queensland, Australia. The schools will be cluster randomised to one of four groups; (i) CLIMATE Schools Combined intervention; (ii) CLIMATE Schools - Substance Use; (iii) CLIMATE Schools - Mental Health, or (iv) Control (Health and Physical Education as usual). The primary outcomes of the trial will be the uptake and harmful use of alcohol and other drugs, mental health symptomatology and anxiety, depression and substance use knowledge. Secondary outcomes include substance use related harms, self-efficacy to resist peer pressure, general disability, and truancy. The link between personality and substance use will also be examined. Discussion Compared to students who receive the universal CLIMATE Schools - Substance Use, or CLIMATE Schools - Mental Health or the Control condition (who received usual Health and Physical Education), we expect students who receive the CLIMATE Schools Combined intervention to show greater delays to the initiation of substance use, reductions in substance use and mental health symptoms, and increased substance use and mental health knowledge
Resumo:
Poor air quality has a huge detrimental effect, both economic and on the quality of life, in Australia. Transit oriented design (TOD), which aims to minimise urban sprawl and lower dependency on vehicles, leads to an increasing number of buildings close to transport corridors. This project aims at providing guidelines that are appropriate to include within City Plan to inform future planning along road corridors, and provide recommendations on when mitigation measures should be utilised.