622 resultados para Key Agreement Protocol


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The results of comprehensive experimental studies of the operation, stability, and plasma parameters of the low-frequency (0.46 MHz) inductively coupled plasmas sustained by the internal oscillating rf current are reported. The rf plasma is generated by using a custom-designed configuration of the internal rf coil that comprises two perpendicular sets of eight currents in each direction. Various diagnostic tools, such as magnetic probes, optical emission spectroscopy, and an rf-compensated Langmuir probe were used to investigate the electromagnetic, optical, and global properties of the argon plasma in wide ranges of the applied rf power and gas feedstock pressure. It is found that the uniformity of the electromagnetic field inside the plasma reactor is improved as compared to the conventional sources of inductively coupled plasmas with the external flat coil configuration. A reasonable agreement between the experimental data and computed electromagnetic field topography inside the chamber is reported. The Langmuir probe measurements reveal that the spatial profiles of the electron density, the effective electron temperature, plasma potential, and electron energy distribution/probability functions feature a high degree of the radial and axial uniformity and a weak azimuthal dependence, which is consistent with the earlier theoretical predictions. As the input rf power increases, the azimuthal dependence of the global plasma parameters vanishes. The obtained results demonstrate that by introducing the internal oscillated rf currents one can noticeably improve the uniformity of electromagnetic field topography, rf power deposition, and the plasma density in the reactor.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis evaluates the security of Supervisory Control and Data Acquisition (SCADA) systems, which are one of the key foundations of many critical infrastructures. Specifically, it examines one of the standardised SCADA protocols called the Distributed Network Protocol Version 3, which attempts to provide a security mechanism to ensure that messages transmitted between devices, are adequately secured from rogue applications. To achieve this, the thesis applies formal methods from theoretical computer science to formally analyse the correctness of the protocol.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background The Researching Effective Approaches to Cleaning in Hospitals (REACH) study will generate evidence about the effectiveness and cost-effectiveness of a novel cleaning initiative that aims to improve the environmental cleanliness of hospitals. The initiative is an environmental cleaning bundle, with five interdependent, evidence-based components (training, technique, product, audit and communication) implemented with environmental services staff to enhance hospital cleaning practices. Methods/design The REACH study will use a stepped-wedge randomised controlled design to test the study intervention, an environmental cleaning bundle, in 11 Australian hospitals. All trial hospitals will receive the intervention and act as their own control, with analysis undertaken of the change within each hospital based on data collected in the control and intervention periods. Each site will be randomised to one of the 11 intervention timings with staggered commencement dates in 2016 and an intervention period between 20 and 50 weeks. All sites complete the trial at the same time in 2017. The inclusion criteria allow for a purposive sample of both public and private hospitals that have higher-risk patient populations for healthcare-associated infections (HAIs). The primary outcome (objective one) is the monthly number of Staphylococcus aureus bacteraemias (SABs), Clostridium difficile infections (CDIs) and vancomycin resistant enterococci (VRE) infections, per 10,000 bed days. Secondary outcomes for objective one include the thoroughness of hospital cleaning assessed using fluorescent marker technology, the bio-burden of frequent touch surfaces post cleaning and changes in staff knowledge and attitudes about environmental cleaning. A cost-effectiveness analysis will determine the second key outcome (objective two): the incremental cost-effectiveness ratio from implementation of the cleaning bundle. The study uses the integrated Promoting Action on Research Implementation in Health Services (iPARIHS) framework to support the tailored implementation of the environmental cleaning bundle in each hospital. Discussion Evidence from the REACH trial will contribute to future policy and practice guidelines about hospital environmental cleaning. It will be used by healthcare leaders and clinicians to inform decision-making and implementation of best-practice infection prevention strategies to reduce HAIs in hospitals. Trial registration Australia New Zealand Clinical Trial Registry ACTRN12615000325​505

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Family law reforms in Australia require separated parents in dispute to attempt mandatory family dispute resolution (FDR) in community-based family services before court attendance. However, there are concerns about such services when clients present with a history of high conflict and family violence. This study protocol describes a longitudinal study of couples presenting for family mediation services. The study aims to describe the profile of family mediation clients, including type of family violence, and determine the impact of violence profiles on FDR processes and outcomes, such as the type and durability of shared parenting arrangements and clients’ satisfaction with mediated agreements. Methods A mixed method, naturalistic longitudinal design is used. The sampling frame is clients presenting at nine family mediation centres across metropolitan, outer suburban, and regional/rural sites in Victoria, Australia. Data are collected at pre-test, completion of mediation, and six months later. Self-administered surveys are administered at the three time points, and a telephone interview at the final post-test. The key study variable is family violence. Key outcome measures are changes in the type and level of acrimony and violent behaviours, the relationship between violence and mediated agreements, the durability of agreements over six months, and client satisfaction with mediation. Discussion Family violence is a major risk to the physical and mental health of women and children. This study will inform debates about the role of family violence and how to manage it in the family mediation context. It will also inform decision-making about mediation practices by better understanding how mediation impacts on parenting agreements, and the implications for children, especially in the context of family violence.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report a theoretical study of the multiple oxidation states (1+, 0, 1−, and 2−) of a meso,meso-linked diporphyrin, namely bis[10,15,20-triphenylporphyrinatozinc(II)-5-yl]butadiyne (4), using Time-Dependent Density Functional Theory (TDDFT). The origin of electronic transitions of singlet excited states is discussed in comparison to experimental spectra for the corresponding oxidation states of the close analogue bis{10,15,20-tris[3‘,5‘-di-tert-butylphenyl]porphyrinatozinc(II)-5-yl}butadiyne (3). The latter were measured in previous work under in situ spectroelectrochemical conditions. Excitation energies and orbital compositions of the excited states were obtained for these large delocalized aromatic radicals, which are unique examples of organic mixed-valence systems. The radical cations and anions of butadiyne-bridged diporphyrins such as 3 display characteristic electronic absorption bands in the near-IR region, which have been successfully predicted with use of these computational methods. The radicals are clearly of the “fully delocalized” or Class III type. The key spectral features of the neutral and dianionic states were also reproduced, although due to the large size of these molecules, quantitative agreement of energies with observations is not as good in the blue end of the visible region. The TDDFT calculations are largely in accord with a previous empirical model for the spectra, which was based simplistically on one-electron transitions among the eight key frontier orbitals of the C4 (1,4-butadiyne) linked diporphyrins.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.