382 resultados para secure interoperation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Despite the widely recognised importance of sustainable health care systems, health services research remains generally underfunded in Australia. The Australian Centre for Health Services Innovation (AusHSI) is funding health services research in the state of Queensland. AusHSI has developed a streamlined protocol for applying and awarding funding using a short proposal and accelerated peer review. Method An observational study of proposals for four health services research funding rounds from May 2012 to November 2013. A short proposal of less than 1,200 words was submitted using a secure web-based portal. The primary outcome measures are: time spent preparing proposals; a simplified scoring of grant proposals (reject, revise or accept for interview) by a scientific review committee; and progressing from submission to funding outcomes within eight weeks. Proposals outside of health services research were deemed ineligible. Results There were 228 eligible proposals across 4 funding rounds: from 29% to 79% were shortlisted and 9% to 32% were accepted for interview. Success rates increased from 6% (in 2012) to 16% (in 2013) of eligible proposals. Applicants were notified of the outcomes within two weeks from the interview; which was a maximum of eight weeks after the submission deadline. Applicants spent 7 days on average preparing their proposal. Applicants with a ranking of reject or revise received written feedback and suggested improvements for their proposals, and resubmissions composed one third of the 2013 rounds. Conclusions The AusHSI funding scheme is a streamlined application process that has simplified the process of allocating health services research funding for both applicants and peer reviewers. The AusHSI process has minimised the time from submission to notification of funding outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A staged crime scene involves deliberate alteration of evidence by the offender to simulate events that did not occur for the purpose of misleading authorities (Geberth, 2006; Turvey, 2000). This study examined 115 staged homicides from the USA to determine common elements; victim and perpetrator characteristics; and specific features of different types of staged scenes. General characteristics include: multiple victims and offenders; a previous relationship be- tween parties involved; and victims discovered in their own home, often by the offender. Staged scenes were separated by type with staged burglaries, suicides, accidents, and car accidents examined in more detail. Each type of scene displays differently with separate indicators and common features. Features of staged burglaries were: no points of entry/exit staged; non-valuables taken; scene ransacking; offender self- injury; and offenders bringing weapons to the scene. Features of staged suicides included: weapon arrangement and simulating self-injury to the victim; rearranging the body; and removing valuables. Examples of elements of staged accidents were arranging the implement/weapon and re- positioning the deceased; while staged car accidents involved: transporting the body to the vehicle and arranging both; mutilation after death; attempts to secure an alibi; and clean up at the primary crime scene. The results suggest few staging behaviors are used, despite the credibility they may have offered the façade. This is the first peer-reviewed, published study to examine the specific features of these scenes, and is the largest sample studied to date.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The broad aim of of this thesis is to contribute to understanding how the relationships between culture, employment and education can help Tanzania's young people secure jobs, and survive in the creative workforce so as to better their future. Based on a range of interviews and other data in Tanzania, the study considers how to integrate cultural expressions into arts education (education in art and education through art) as a tool for nurturing young people's creative talents for their future sustainable employment in Tanzania.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In ecosystems driven by water availability, plant community dynamics depend on complex interactions between vegetation, hydrology, and human water resources use. Along ephemeral rivers—where water availability is erratic—vegetation and people are particularly vulnerable to changes in each other's water use. Sensible management requires that water supply be maintained for people, while preserving ecosystem health. Meeting such requirements is challenging because of the unpredictable water availability. We applied information gap decision theory to an ecohydrological system model of the Kuiseb River environment in Namibia. Our aim was to identify the robustness of ecosystem and water management strategies to uncertainties in future flood regimes along ephemeral rivers. We evaluated the trade-offs between alternative performance criteria and their robustness to uncertainty to account for both (i) human demands for water supply and (ii) reducing the risk of species extinction caused by water mining. Increasing uncertainty of flood regime parameters reduced the performance under both objectives. Remarkably, the ecological objective (species coexistence) was more sensitive to uncertainty than the water supply objective. However, within each objective, the relative performance of different management strategies was insensitive to uncertainty. The ‘best’ management strategy was one that is tuned to the competitive species interactions in the Kuiseb environment. It regulates the biomass of the strongest competitor and, thus, at the same time decreases transpiration, thereby increasing groundwater storage and reducing pressure on less dominant species. This robust mutually acceptable strategy enables species persistence without markedly reducing the water supply for humans. This study emphasises the utility of ecohydrological models for resource management of water-controlled ecosystems. Although trade-offs were identified between alternative performance criteria and their robustness to uncertain future flood regimes, management strategies were identified that help to secure an ecologically sustainable water supply.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any tsecure for any t

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Integration of biometrics is considered as an attractive solution for the issues associated with password based human authentication as well as for secure storage and release of cryptographic keys which is one of the critical issues associated with modern cryptography. However, the widespread popularity of bio-cryptographic solutions are somewhat restricted by the fuzziness associated with biometric measurements. Therefore, error control mechanisms must be adopted to make sure that fuzziness of biometric inputs can be sufficiently countered. In this paper, we have outlined such existing techniques used in bio-cryptography while explaining how they are deployed in different types of solutions. Finally, we have elaborated on the important facts to be considered when choosing appropriate error correction mechanisms for a particular biometric based solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We’re starting 2015 with an experiment in collaborative creative writing. What happens when you ask ten academics to write a story together? Taking our cue from the Exquisite Cadaver game played by Surrealist artists and poets in the 1930s, we’ve asked our authors to contribute to a story in progress. We gave them free rein: no restrictions on style or genre.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Food security exists when all people, at all times, have physical, economic and socially acceptable access to safe, sufficient, and adequately nutritious food in order to meet their dietary needs for an active and healthy life. For high income countries and those experiencing the nutrition transition, food security is not only about the quantity of available food but also the nutritional quality as related to over- and under-nutrition. Vietnam is currently undergoing this nutrition transition, and as a result the relationship between food insecurity, socio-demographic factors and weight status is complex. The primary objective of this study was to therefore measure the prevalence of household food insecurity in a disadvantaged urban district in Ho Chi Minh City (HCMC) in Vietnam using a more comprehensive tool. This study also aims to examine the relationships between food insecurity and socio-demographic factors, weight status, and food intakes. Methods A cross-sectional study was conducted using multi-stage sampling. Adults who were mainly responsible for cooking were interviewed in 250 households. Data was collected on socioeconomic and demographic factors using previously validated tools. Food security was assessed using the Latin American and Caribbean Household Food Security Scale (ELCSA) tool and households were categorized as food secure or mildly, moderately or severely food insecure. Questions regarding food intake were based on routinely used and validated questions in HCMC, weight status was self-reported. Results Cronbach’s alpha coefficient was 0.87, showing the ELCSA had a good internal reliability. Approximately 34.4% of households were food insecure. Food insecurity was inversely related to total household income (OR = 0.09, 95% CI = 0.04 - 0.22) and fruit intakes (OR = 2.2, 95% CI 1.31 - 4.22). There was no association between weight and food security status. Conclusions Despite rapid industrialization and modernization, food insecurity remains an important public health issue in large urban areas of HCMC, suggesting that strategies to address food insecurity should be implemented in urban settings, and not just rural locations. Fruit consumption among food insecure households may be compromised because of financial difficulties, which may lead to poorer health outcomes particularly related to non-communicable disease prevention and management.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nth-Dimensional Truncated Polynomial Ring (NTRU) is a lattice-based public-key cryptosystem that offers encryption and digital signature solutions. It was designed by Silverman, Hoffstein and Pipher. The NTRU cryptosystem was patented by NTRU Cryptosystems Inc. (which was later acquired by Security Innovations) and available as IEEE 1363.1 and X9.98 standards. NTRU is resistant to attacks based on Quantum computing, to which the standard RSA and ECC public-key cryptosystems are vulnerable to. In addition, NTRU has higher performance advantages over these cryptosystems. Considering this importance of NTRU, it is highly recommended to adopt NTRU as part of a cipher suite along with widely used cryptosystems for internet security protocols and applications. In this paper, we present our analytical study on the implementation of NTRU encryption scheme which serves as a guideline for security practitioners who are novice to lattice-based cryptography or even cryptography. In particular, we show some non-trivial issues that should be considered towards a secure and efficient NTRU implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The world and its peoples are facing multiple, complex challenges and we cannot continue as we are (Moss, 2010). Earth‘s “natural capital” - nature‘s ability to provide essential ecosystem services to stabilize world climate systems, maintain water quality, support secure food production, supply energy needs, moderate environmental impacts, and ensure social harmony and equity – is seriously compromised (Gough, 2005; Hawkins, Lovins & Lovins, 1999). To further summarize, current rates of resource consumption by the global human population are unsustainable (Kitzes, Peller, Goldfinger & Wackernagel, 2007) for human and non-human species, and for future generations. Further, continuing growth in world population and global political commitment to growth economics compounds these demands. Despite growing recognition of the serious consequences for people and planet, little consideration is given, within most nations, to the social and environmental issues that economic growth brings. For example, Australia is recognised as one of the developed countries most vulnerable to the impacts of climate change. Yet, to date, responses (such as carbon pricing) have been small-scale, fragmented, and their worth disputed, even ridiculed. This is at a time referred to as ‘the critical decade’ (Hughes & McMichael, 2011) when the world’s peoples must make strong choices if we are to avert the worst impacts of climate change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There’s growing evidence that psychosis is linked to the physical environments that we live in. Good environments are the ones that allow people to step back, relax and feel secure, while engaging in interesting and meaningful activity. Bad environments don’t allow respite: they keep people on their toes and somehow magnify meaninglessness and hollow rules and unreasonable demands. They may also be bleak and even unfair or outright scary. But don’t expect everyone to notice the bad environments: recent studies demonstrate that patients with psychosis are far more likely to notice even subtle negative features in the environment than people without symptoms. The same patients are also less likely to notice the good things an environment has to offer – but that doesn’t mean they shouldn’t be provided.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A successful translocation involves many complex factors, including a genetically appropriate source population that can sustain harvest, social and governmental support, assessment of disease transmission risk and a release site with appropriately secure habitat that can support population establishment and persistance. This information is typically discussed during staturory approval processes and can take considerable time. However, following approval, for translocations of most fauna, the initial critical step involves the inherently stressful process of capture, holding, transportation and release. This process is unpredictable and novel, and is especially challenging for wild animals when they are confined in close proximity to conspecifics and humans. In contrast, captive-reared animals have to cope with the unfamiliar challenges of finding food and shelter, along with coping with competition and predation. Little has been written in the scientific literature about the translocation process. This is unsurprising because this process has usually been the realm of skilled practioners, often with animal husbandry backgrounds, rather than research scientists. Highly skilled intuition, observation and the translocation practioner's equivalent of a 'green thumb' often guides the way. However, theory and experimentation, particularly on the effects of stress, is available and this work is invaluable for a successful translocation. Here, we provide a brief description of the translocation process, and discussion of what stress is and how it can be managed. We then provide practical guidelines for the successful translocation of invertebrates, lizards, turtles, passerine birds, marsupials and bats, using examples from Australia and New Zealand.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Real-world cryptographic protocols such as the widely used Transport Layer Security (TLS) protocol support many different combinations of cryptographic algorithms (called ciphersuites) and simultaneously support different versions. Recent advances in provable security have shown that most modern TLS ciphersuites are secure authenticated and confidential channel establishment (ACCE) protocols, but these analyses generally focus on single ciphersuites in isolation. In this paper we extend the ACCE model to cover protocols with many different sub-protocols, capturing both multiple ciphersuites and multiple versions, and define a security notion for secure negotiation of the optimal sub-protocol. We give a generic theorem that shows how secure negotiation follows, with some additional conditions, from the authentication property of secure ACCE protocols. Using this framework, we analyse the security of ciphersuite and three variants of version negotiation in TLS, including a recently proposed mechanism for detecting fallback attacks.