280 resultados para key worker


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Employer non-compliance with workers’ entitlements is an area seldom explored in Australian industrial relations, generally considered uncommon or the province of ‘rogue’ employers. This paper provides a picture of the categories of entitlements against which complaints of evasion were made in the federal industrial relations jurisdiction in Australia, between 1986 and 1995 and the characteristics of complainants. The “top 30” awards ranked by extent of underpayment recovered by the federal enforcement agency (1987-95) are also explored to support arguments that intense competition, reduced union density, precarious employment, youth and being female are strongly associated with employer evasion. The increasing prevalence of these factors in the labour market suggests that employer compliance should be more carefully explored in the Australian context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.