36 resultados para RSA


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Chronic kidney disease (CKD) leads to a range of symptoms which are often under-recognised. Little is known about the full range of symptoms, particularly in who are pre-dialysis. Understanding symptom prevalence, distress, severity and frequency will help prioritise symptom management. Aims To examine symptom burden in advanced CKD (stages 4 and 5) and compare the symptom experience between those receiving dialysis or those who are pre-dialysis. Methods Using a cross-sectional design, a convenience sample of 436 people from three hospitals completed the Modified Dialysis Symptom Index (MDSI). Demographic and renal history data was also collected. Based on the 32 symptoms, we compared the prevalence, severity, distress and frequency of each symptom by treatment modality. Results Mean age was 48 years (range 18-87 years) and 53% were male. 75.5% (haemodialysis = 287; peritoneal dialysis = 42) were receiving dialysis and 24.5% (n = 107) were pre-dialysis. Overall, the mean symptom prevalence was 12.6 ± 7.9 and the most prevalent symptoms were fatigue (77%), bone or joint pain (60.3%) and itching (59.6%) across all CKD groups. The distress, severity and frequency of the symptoms were higher in the dialysis group. However, a higher frequency of psychological symptoms (worrying, feeling nervous and depression) were reported in the pre-dialysis group. Implication for clinical practice Patients with advanced CKD have a high symptom burden with those who are pre-dialysis needing greater psychological support. The MDSI could be used in nursing practice to screen patients for symptoms which could lead to timely and appropriate interventions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This workshop comprised a diverse group of African construction experts, ranging far wider than RSA. Each of the attendees had attended the annual ASOCSA conference and was additionally provided with a short workshop pre-brief. The aim was to develop a view of their 15-20 year vision of construction improvement in RSA and the steps necessary to get there. These included sociological, structural, technical and process changes. Whilst some suggestions are significantly challenging, none are impossible, given sufficient collaboration between government, industry, academia and NGOs. The highest priority projects (more properly, programmes) were identified and further explored. These are: 1. Information Hub (‘Open Africa’). Aim – to utilise emerging trends in Open Data to provide a force for African unity. 2. Workforce Development. Aim – to rebuild a competent, skilled construction industry for RSA projects and for export. 3. Modular DIY Building. Aim – to accelerate the development of sustainable, cost-efficient and desirable housing for African economic immigrants and others living in makeshift and slum dwellings. Open Data is a maturing theme in different cities and governments around the world and the workshop attendees were very keen to seize such a possibility to assist in developing an environment where Africans can share information and foster collaboration. It is likely that NGOs might be keen to follow up such an initiative. There are significant developments taking place around the world in the construction sector currently, with comparatively large savings being made for taxpayers (20% plus in the UK). Not all of these changes would be easy to transplant to RSA (even more so to much of the rest of Africa). Workforce development was a keen plea amongst the attendees, who seemed concerned that expertise has leaked away and is not being replaced with sufficient intensity. It is possible today to develop modular buildings in such a way that even unskilled residents can assist in their construction, and even their appropriate design. These buildings can be sited nearly autonomously from infrastructures, thus relieving the tensions on cities and townships, whilst providing humane accommodation for the economically disadvantaged. Development of suitable solutions could either be conducted with other similarly stressed countries or developed in-country and the expertise exported. Finally, it should be pointed out that this was very much a first step. Any opportunity to collaborate from an Australian, QUT or CIB perspective would be welcomed, whilst acknowledging that the leading roles belong to RSA, CSIR, NRF, ASOCSA and the University of KwaZulu-Natal.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The business value of IT (BVIT) has been a prominent and central research topic in the IS discipline. Due to continuous and unpredictable technology and business changes, a more dynamic perspective on IT business value that includes organizational learning is required. We suggest that simple rules heuristics can address this challenge. The simple rules heuristics approach has been introduced by Eisenhardt and co-authors (Bingham & Eisenhardt, 2011; Bingham, Eisenhardt, & Furr, 2007; Eisenhardt & Sull, 2001) to better understand strategic decision making for capturing superabundant, heterogeneous, fastmoving opportunities. They argue that explicit organizational learning can translate accumulated experience into increasingly effective heuristics for strategic processes in highvelocity environments. We make three main contributions by exploring the suitability of a simple rules heuristics approach for the creation of IT business value: (1) we propose six types of simple rules heuristics for capturing IT-based opportunities in dynamic environments, including synergy heuristics as specifically relevant in an IT context, (2) we show how a simple rules heuristics approach can advance our understanding of dynamics and organizational learning for BVIT, and; (3) we introduce the strategic logic of opportunity to BVIT.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction β-alanine (BAl) and NaHCO3 (SB) ingestion may provide performance benefits by enhancing concentrations of their respective physiochemical buffer counterparts, muscle carnosine and blood bicarbonate, counteracting acidosis during intense exercise. This study examined the effect of BAl and SB co-supplementation as an ergogenic strategy during high-intensity exercise. Methods Eight healthy males ingested either BAl (4.8 g day−1 for 4 weeks, increased to 6.4 g day−1 for 2 weeks) or placebo (Pl) (CaCO3) for 6 weeks, in a crossover design (6-week washout between supplements). After each chronic supplementation period participants performed two trials, each consisting of two intense exercise tests performed over consecutive days. Trials were separated by 1 week and consisted of a repeated sprint ability (RSA) test and cycling capacity test at 110 % Wmax (CCT110 %). Placebo (Pl) or SB (300 mg kgbw−1) was ingested prior to exercise in a crossover design to creating four supplement conditions (BAl-Pl, BAl-SB, Pl–Pl, Pl-SB). Results Carnosine increased in the gastrocnemius (n = 5) (p = 0.03) and soleus (n = 5) (p = 0.02) following BAl supplementation, and Pl-SB and BAl-SB ingestion elevated blood HCO3 − concentrations (p < 0.01). Although buffering capacity was elevated following both BAl and SB ingestion, performance improvement was only observed with BAl-Pl and BAl-SB increasing time to exhaustion of the CCT110 % test 14 and 16 %, respectively, compared to Pl–Pl (p < 0.01). Conclusion Supplementation of BAl and SB elevated buffering potential by increasing muscle carnosine and blood bicarbonate levels, respectively. BAl ingestion improved performance during the CCT110 %, with no aggregating effect of SB supplementation (p > 0.05). Performance was not different between treatments during the RSA test.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.