319 resultados para Nancy Gonzalez


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}. The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents efficient formulas for computing cryptographic pairings on the curve y 2 = c x 3 + 1 over fields of large characteristic. We provide examples of pairing-friendly elliptic curves of this form which are of interest for efficient pairing implementations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This practice-led research was initiated in response to a series of violent encounters that occurred between my fragile installations and viewers. The central focus of this study was to recuperate my installation practice in the wake of such events. This led to the development of a ‘responsive practice’ methodology, which reframed the installation process through an ethical lens developed from Emmanuel Levinas’ ethical phenomenology. The central propositions of this research are the reconceptualisation of ‘violent encounters’ in terms of difference whereby I accept viewers responses, even those which are violent, destructive or damaging, and secondly that the process operates as a generative excess for practice through which recuperative strategies can be found and implemented. By re-examining this process as it unfolded in the three phases of the practical component, I developed strategies whereby violated, destroyed or damaged works could be recuperated through the processes of reconfiguration, reparation and regeneration. Therefore my installations embody and articulate vulnerability but also demonstrate resilience and renewal.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examine the use of randomness extraction and expansion in key agreement (KA) pro- tocols to generate uniformly random keys in the standard model. Although existing works provide the basic theorems necessary, they lack details or examples of appropriate cryptographic primitives and/or parameter sizes. This has lead to the large amount of min-entropy needed in the (non-uniform) shared secret being overlooked in proposals and efficiency comparisons of KA protocols. We therefore summa- rize existing work in the area and examine the security levels achieved with the use of various extractors and expanders for particular parameter sizes. The tables presented herein show that the shared secret needs a min-entropy of at least 292 bits (and even more with more realistic assumptions) to achieve an overall security level of 80 bits using the extractors and expanders we consider. The tables may be used to �nd the min-entropy required for various security levels and assumptions. We also �nd that when using the short exponent theorems of Gennaro et al., the short exponents may need to be much longer than they suggested.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent years have seen intense scrutiny focused on the reported ethical breaches of enterprises across the globe. At the forefront of the accompanying criticism are the actions of giant American firms such as WorldCom, Arthur Anderson, and Enron. However, such deviations from acceptable standards of conduct have not been confined to the American market. Australia endured its era of “corporate excess” in the 1980s [Milton-Smith, 1997]. As a result, a spate of ethics-based research was undertaken in the early 1990s. More recently, China has been identified as a major venue for behavior deemed to be unacceptable, even unsafe. Issues such as counterfeit fashion items, software, and automobile parts have been a concern for several years [Gonzalez, 2007]. Perhaps more disconcerting are the recent recalls of children’s products, many of which were produced for leading toy companies such as Mattel and Fisher-Price, because of the use of dangerous lead-based paint. As one might anticipate, news reports and consumer protection agencies have been quick to condemn any action that falls within the “controversial” category. Indeed, many segments of society characterize such actions as unethical behavior. One result of this increased level of concern is the higher level of attention given to ethics in higher education programs. Even accreditation bodies such as AACSB have virtually mandated the integration of ethics into the curriculum. As a consequence, academicians have ramped up their ethics-based research agendas.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Both clinical practice and clinical research settings can require successive administrations of a memory test, particularly when following the trajectory of suspected memory decline in older adults. However, relatively few verbal episodic memory tests have alternative forms. We set out to create a broad based memory test to allow for the use of an essentially unlimited number of alternative forms. Four tasks for inclusion in such a test were developed. These tasks varied the requirement for recall as opposed to recognition, the need to form an association between unrelated words, and the need to discriminate the most recent list from earlier lists, all of which proved useful. A total of 115 participants completed the battery of tests and were used to show that the test could differentiate between older and younger adults; a sub-sample of 73 participants completed alternative forms of the tests to determine test-retest reliability and the amount of learning to learn.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper compares the performances of two different optimisation techniques for solving inverse problems; the first one deals with the Hierarchical Asynchronous Parallel Evolutionary Algorithms software (HAPEA) and the second is implemented with a game strategy named Nash-EA. The HAPEA software is based on a hierarchical topology and asynchronous parallel computation. The Nash-EA methodology is introduced as a distributed virtual game and consists of splitting the wing design variables - aerofoil sections - supervised by players optimising their own strategy. The HAPEA and Nash-EA software methodologies are applied to a single objective aerodynamic ONERA M6 wing reconstruction. Numerical results from the two approaches are compared in terms of the quality of model and computational expense and demonstrate the superiority of the distributed Nash-EA methodology in a parallel environment for a similar design quality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the new challenges in aeronautics is combining and accounting for multiple disciplines while considering uncertainties or variability in the design parameters or operating conditions. This paper describes a methodology for robust multidisciplinary design optimisation when there is uncertainty in the operating conditions. The methodology, which is based on canonical evolution algorithms, is enhanced by its coupling with an uncertainty analysis technique. The paper illustrates the use of this methodology on two practical test cases related to Unmanned Aerial Systems (UAS). These are the ideal candidates due to the multi-physics involved and the variability of missions to be performed. Results obtained from the optimisation show that the method is effective to find useful Pareto non-dominated solutions and demonstrate the use of robust design techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The creative work, ¡Latin Jazz! is a 50 minute radio documentary to be broadcast on ABC Classic FM. It looks at the evolution of Latin jazz from Spain, Cuba and the United States. It examines the social effects on the style and specifically on the syncretic movement between the countries. The documentary traces my travel to Madrid, Spain and looks at Latin jazz through a deconstruction of the style, musical examples and interviews with prominent artists. Artists interviewed were Chano Domínguez, a Spanish flamenco jazz pianist, Bobby Martínez an American saxophonist, Alain Pérez a Cuban bassist and Pepe Rivero a Cuban pianist. The exegesis supports the radio documentary by examining the style in more depth, and is broken into three main sections. First it traces the historical relationship that occurred through the Ida y Vuelta (To and Fro), the similarities and influences through the habanera, the decíma and the religion of Santería. This is followed by specific musical elements within Latin jazz such as instrumentation, clave, harmony and improvisation, whilst the third section looks at the influences of the new syncretic movement back to Spain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examined differences in response latencies obtained during a validated video-based hazard perception driving test between three healthy, community-dwelling groups: 22 mid-aged (35-55 years), 34 young-old (65-74 years), and 23 old-old (75-84 years) current drivers, matched for gender, education level, and vocabulary. We found no significant difference in performance between mid-aged and young-old groups, but the old-old group was significantly slower than the other two groups. The differences between the old-old group and the other groups combined were independently mediated by useful field of view (UFOV), contrast sensitivity, and simple reaction time measures. Given that hazard perception latency has been linked with increased crash risk, these results are consistent with the idea that increased crash risk in older adults could be a function of poorer hazard perception, though this decline does not appear to manifest until age 75+ in healthy drivers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present study used a university sample to assess the test-retest reliability and validity of the Australian Propensity for Angry Driving Scale (Aus-PADS). The scale has stability over time, and convergent validity was established, as Aus-PADS scores correlated significantly with established anger and impulsivity measures. Discriminant validity was also established, as Aus-PADS scores did not correlate with Venturesomeness scores. The Aus-PADS has demonstrated criterion validity, as scores were correlated with behavioural measures, such as yelling at other drivers, gesturing at other drivers, and feeling angry but not doing anything. Aus-PADS scores reliably predicted the frequency of these behaviours over and above other study variables. No significant relationship between aggressive driving and crash involvement was observed. It was concluded that the Aus-PADS is a reliable and valid tool appropriate for use in Australian research, and that the potential relationship between aggressive driving and crash involvement warrants further investigation with a more representative (and diverse) driver sample.