102 resultados para Claiborne, Harry Eugene


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a model for generating a MAC tag by injecting the input message directly into the internal state of a nonlinear filter generator. This model generalises a similar model for unkeyed hash functions proposed by Nakano et al. We develop a matrix representation for the accumulation phase of our model and use it to analyse the security of the model against man-in-the-middle forgery attacks based on collisions in the final register contents. The results of this analysis show that some conclusions of Nakano et al regarding the security of their model are incorrect. We also use our results to comment on several recent MAC proposals which can be considered as instances of our model and specify choices of options within the model which should prevent the type of forgery discussed here. In particular, suitable initialisation of the register and active use of a secure nonlinear filter will prevent an attacker from finding a collision in the final register contents which could result in a forged MAC.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study aimed to assess the feasibility of a home-based exercise program and examine the effects on the healing rates of venous leg ulcers. A 12 –week randomised controlled trial was conducted investigating the effects of an exercise intervention compared to a usual care group. Participants in both groups (n = 13) had active venous ulceration and were treated in a metropolitan hospital outpatients clinic in Australia. Data were collected on recruitment from medical records, clinical assessment and questionnaires. Follow-up data on progress in healing and treatments were collected fortnightly for 12 weeks. Calf muscle pump function data were collected at baseline and 12 weeks from recruitment. Range of ankle motion data were collected at baseline, 6 and 12 weeks from recruitment. This pilot study indicated that the intervention was feasible. Clinical significance was observed in the intervention group with a 32% greater decrease in ulcer size (p=0.34) than the control group, and a 10% (p=0.74) improvement in the number of participants healed in the intervention group compared to the control group. Significant differences between groups over time were observed in calf muscle pump function parameters; (ejection fraction [p = 0.05]; residual volume fraction [p = 0.04]) and range of ankle motion (p = 0.01). This pilot study is one of the first studies to examine and measure clinical healing rates for participants involved in a home-based progressive resistance exercise program. Further research is warranted with a larger multi-site study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Well-designed initialisation and keystream generation processes for stream ciphers should ensure that each key-IV pair generates a distinct keystream. In this paper, we analyse some ciphers where this does not happen due to state convergence occurring either during initialisation, keystream generation or both. We show how state convergence occurs in each case and identify two mechanisms which can cause state convergence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which uses a majority clocking rule to update its registers. It is designed to provide privacy for the GSM system. In this paper, we analyse the initialisation process of A5/1. We demonstrate a sliding property of the A5/1 cipher, where every valid internal state is also a legitimate loaded state and multiple key-IV pairs produce phase shifted keystream sequences. We describe a possible ciphertext only attack based on this property.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last two decades, the internet and e-commerce have reshaped the way we communicate, interact and transact. In the converged environment enabled by high speed broadband, web 2.0, social media, virtual worlds, user-generated content, cloud computing, VoIP, open source software and open content have rapidly become established features of our online experience. Business and government alike are increasingly using the internet as the preferred platform for delivery of their goods and services and for effective engagement with their clients. New ways of doing things online and challenges to existing business, government and social activities have tested current laws and often demand new policies and laws, adapted to the new realities. The focus of this book is the regulation of social, cultural and commercial activity on the World Wide Web. It considers developments in the law that have been, and continue to be, brought about by the emergence of the internet and e-commerce. It analyses how the law is applied to define rights and obligations in relation to online infrastructure, content and practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proteinuria was observed in 27% of 153 patients taking tenofovir for more than 1 year. Concomitant protease inhibitor therapy and cumulative tenofovir exposure were independently associated with proteinuria in this cohort. Proteinuria was reversible in 11 of 12 patients who ceased tenofovir because of proteinuria without altering other medications. Clinicians should be aware that tenofovir can cause reversible proteinuria in patients with HIV.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the approach of Berbain et al. to Trivium-like ciphers and perform new algebraic analyses on them, namely Trivium and its reduced versions: Trivium-N, Bivium-A and Bivium-B. In doing so, we answer an open question in the literature. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques which use the F4 algorithm to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analysis. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The trafficking of women has attracted considerable international and national policy attention, particularly since the UN Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children (2000), of which the Australian Government has been a signatory since 2005. The provision of health and community services for trafficked women is a central feature of this Protocol, but in Australia service provision is made difficult by how trafficked women are understood and treated in policy and legal terms. This study aimed to explore the provision of health and community services for trafficked women in the Greater Sydney region through a series of interviews with government and non-government organisations. The findings reveal that services have been inaccessible as a result of sparse, uncoordinated, and poorly funded provision. The major obstacle to adequate and appropriate service provision has been a national policy approach focusing on 'border protection' and criminalisation rather than on trafficked women and their human rights. We conclude that further policy development needs to focus on the practical implications of how such rights can be translated into the delivery of health and community services that trafficked women can access and be supported by more effectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian policy makers recognise women who are trafficked to Australia (and these are largely for the purposes of sexual exploitation) primarily as victims of crime. The main public mechanism by which the "problem" of trafficked people in Australia is managed is the criminal law. At the same time, however, as a signatory to the UN Protocol on Trafficking and the Declaration of Human Rights, the Australian Government also recognises the rights of women trafficked to Australia to access health and community services in the wake of the health damage and trauma they often incur as a consequence of their experience. Current evidence suggests that trafficked women in Australia face considerable barriers in being able to avail themselves of such a right and of the services that accompany it. This paper explores the tensions posed by Australian policy and service approaches to trafficked women in light of the concept of social citizenship and the ways in which it is mediated in the Australian context by national border protection policy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book examines different aspects of Asian popular culture, including films, TV, music, comedy, folklore, cultural icons, the Internet and theme parks. It raises important questions such as – What are the implications of popularity of Asian popular culture for globalization? Do regional forces impede the globalizing of cultures? Or does the Asian popular culture flow act as a catalyst or conveying channel for cultural globalization? Does the globalization of culture pose a threat to local culture? It addresses two seemingly contradictory and yet parallel processes in the circulation of Asian popular culture: the interconnectedness between Asian popular culture and western culture in an era of cultural globalization that turns subjects such as Pokémon, Hip Hop or Cosmopolitan into truly global phenomena, and the local derivatives and versions of global culture that are necessarily disconnected from their origins in order to cater for the local market. It thereby presents a collective argument that, whilst local social formations, and patterns of consumption and participation in Asia are still very much dependent on global cultural developments and the phenomena of modernity, yet such dependence is often concretized, reshaped and distorted by the local media to cater for the local market. Contents: Introduction: Asian Popular Culture: The Global (Dis)continuity Anthony Y.H. Fung Part 1: The Dominance of Global Continuity: Cultural Localization and Adaptation 1. One Region, Two Modernities: Disneyland in Tokyo and Hong Kong Micky Lee and Anthony Y.H. Fung 2. Comic Travels: Disney Publishing in the People’s Republic of China Jennifer Altehenger 3. When Chinese Youth Meet Harry Potter: Translating Consumption and Middle Class Identification John Nguyet Erni 4.New Forms of Transborder Visuality in Urban China: Saving Face for Magazine Covers Eric Kit-Wai Ma 5. Cultural Consumption and Masculinity: A Case Study of GQ Magazine Covers in Taiwan Hong-Chi Shiau Part 2: Global Discontinuity: The Local Absorption of Global Culture 6. An Unlocalized and Unglobalized Subculture: English Language Independent Music in Singapore Kai Khiun Liew and Shzr Ee Tan 7. The Localized Production of Jamaican Music in Thailand Viriya Sawangchot 8. Consuming Online Games in Taiwan: Global Games and Local Market Lai-Chi Chen 9. The Rise of the Korean Cinema in Inbound and Outbound Globalization Shin Dong Kim Part 3: Cultural Domestication: A New Form of Global Continuity 10. Pocket Capitalism and Virtual Intimacy: Pokémon as a Symptom of Post-Industrial Youth Culture Anne Allison 11. Playing the Global Game: Japan Brand and Globalization Kukhee Choo Part 4: China as a Rising Market: Cultural Antagonism and Globalization 12. China’s New Creative Strategy: The Utilization of Cultural Soft Power and New Markets Michael Keane and Bonnie Liu 13. Renationalizing Hong Kong Cinema: The Gathering Force of the Mainland Market Michael Curtin

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.