234 resultados para Dawson, Buck
Resumo:
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently there is little understanding of how to best protect SCADA systems from malicious attacks. We review the constraints and requirements for SCADA security and propose a suitable architecture (SKMA) for secure SCADA communications. The architecture includes a proposed key management protocol (SKMP). We compare the architecture with a previous proposal from Sandia Labs.
Resumo:
The Queensland Department of Public Works (QDPW) and the Queensland Department of Main Roads (QDMR) have identified a need for industry e-contracting guidelines in the short to medium term. Each of these organisations conducts tenders and contracts for over $600 million annually. This report considers the security and legal issues relating to the shift from a paper-based tendering system to an electronic tendering system. The research objectives derived from the industry partners include: • a review of current standards and e-tendering systems; • a summary of legal requirements impacting upon e-tendering; • an analysis of the threats and requirements for any e-tendering system; • the identification of outstanding issues; • an evaluation of possible e-tendering architectures; • recommendations for e-tendering systems.
Resumo:
Reconfiguration of corporate structures and the retailer-supplier interface in the retail industry have restructured product markets and supply chains, as well as supermarket employment, over the past decade or so (Baret, Lehndorff & Sparks 2000; du Gay 1996). Various studies have examined the consequent changes in labour usage practices within supermarkets or superstores (Baret et al. 2000; Marchington 1995; Penn & Wirth 1993; Sparks 1992; Dawson, Findlay & Sparks 1987, 1986). Commonly, this literature explores the interplay between shifts in the structure of the labour market, broader societal trends and retailers’ employment strategies. One study found that domestic and gender dimensions, accompanied by industrial relations regimes, exert considerable influence on patterns of labour usage (Baret et al. 2000). However, while the types of labour usage and the drivers of changes to labour usage patterns have attracted significant academic attention, research has largely overlooked the ways in which the nature of supermarket work has evolved as a result of changing technology, which effectively bolsters managerial prerogative, and which has affected the skill levels of workers in the industry (Marchington 1995).
Resumo:
LEX is a stream cipher that progressed to Phase 3 of the eSTREAM stream cipher project. In this paper, we show that the security of LEX against algebraic attacks relies on a small equation system not being solvable faster than exhaustive search. We use the byte leakage in LEX to construct a system of 21 equa- tions in 17 variables. This is very close to the require- ment for an efficient attack, i.e. a system containing 16 variables. The system requires only 36 bytes of keystream, which is very low.
Resumo:
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pushing the recent speed limits of Elliptic Curve Cryptography (ECC) forward in a wide range of applications. Notably, the new addition algorithm uses for suitably selected curve constants. In comparison, the fastest point addition algorithms for (twisted) Edwards curves stated in the literature use . It is also shown that the new addition algorithm can be implemented with four processors dropping the effective cost to . This implies an effective speed increase by the full factor of 4 over the sequential case. Our results allow faster implementation of elliptic curve scalar multiplication. In addition, the new point addition algorithm can be used to provide a natural protection from side channel attacks based on simple power analysis (SPA).
Resumo:
This paper provides new results about efficient arithmetic on Jacobi quartic form elliptic curves, y 2 = d x 4 + 2 a x 2 + 1. With recent bandwidth-efficient proposals, the arithmetic on Jacobi quartic curves became solidly faster than that of Weierstrass curves. These proposals use up to 7 coordinates to represent a single point. However, fast scalar multiplication algorithms based on windowing techniques, precompute and store several points which require more space than what it takes with 3 coordinates. Also note that some of these proposals require d = 1 for full speed. Unfortunately, elliptic curves having 2-times-a-prime number of points, cannot be written in Jacobi quartic form if d = 1. Even worse the contemporary formulae may fail to output correct coordinates for some inputs. This paper provides improved speeds using fewer coordinates without causing the above mentioned problems. For instance, our proposed point doubling algorithm takes only 2 multiplications, 5 squarings, and no multiplication with curve constants when d is arbitrary and a = ±1/2.
Resumo:
This paper improves implementation techniques of Elliptic Curve Cryptography. We introduce new formulae and algorithms for the group law on Jacobi quartic, Jacobi intersection, Edwards, and Hessian curves. The proposed formulae and algorithms can save time in suitable point representations. To support our claims, a cost comparison is made with classic scalar multiplication algorithms using previous and current operation counts. Most notably, the best speeds are obtained from Jacobi quartic curves which provide the fastest timings for most scalar multiplication strategies benefiting from the proposed 12M + 5S + 1D point doubling and 7M + 3S + 1D point addition algorithms. Furthermore, the new addition algorithm provides an efficient way to protect against side channel attacks which are based on simple power analysis (SPA). Keywords: Efficient elliptic curve arithmetic,unified addition, side channel attack.
Resumo:
The Melbourne Decision Making Questionnaire (Mann, Burnett, Radford, & Ford, 1997) measures selfreported decision-making coping patterns. The questionnaire was administered to samples of University students in the US (N = 475), Australia (N = 262), New Zealand (N = 260), Japan (N = 359), Hong Kong (N = 281), and Taiwan (N = 414). As predicted, students from the three Western, individualistic cultures (US, Australia, and New Zealand) were more con® dent of their decision-making ability than students from the three East Asian, group-oriented cultures (Japan, Hong Kong, Taiwan). No cross-cultural differences were found in scores on decision vigilance (a careful decision-making style). However, compared with Western students, the Asian students tended to score higher on buck-passing and procrastination (avoidant styles of decision making) as well as hypervigilance (a panicky style of decision making). Japanese students scored lowest on decision self-esteem and highest on procrastination and hypervigilance. It was argued that the con¯ ict model and its attendant coping patterns is relevant for describing and comparing decision making in both Western and Asian cultures.
Resumo:
A study was conducted to examine the factorial validity of the Flinders Decision Making Questionnaire (Mann, 1982), a 31-item self-report inventory designed to measure tendencies to use three major coping patterns identified in the conflict theory of decision making (Janis and Mann, 1977): vigilance, hypervigilance, and defensive avoidance (procrastination, buck-passing, and rationalization). A sample of 2051 university students, comprising samples from Australia (n=262), New Zealand (n=260), the USA (n=475), Japan (n=359), Hong Kong (n=281) and Taiwan (n=414) was administered the DMQ. Factorial validity of the instrument was tested by confirmatory factor analysis with LISREL. Five different substantive models, representing different structural relationships between the decision-coping patterns had unsatisfactory fit to the data and could not be validated. A shortened instrument, containing 22 items, yielded a revised model comprising four identifiable factors-vigilance, hypervigilance, buck-passing, and procrastination. The revised model had adequate fit with data for each country sample and for the total sample, and was confirmed. It is recommended that the 22-item instrument, named the Melbourne DMQ, replace the Flinders DMQ for measurement of decision-coping patterns.
Resumo:
This collection of historical accounts provides diverse perspectives on the structure and culture of the community of researchers who participate in activities of the Australasian Science Education Research Association (ASERA). It describes the formation of the Association, and identifies major changes and challenges for the ever growing and internationalisation of its membership.
Resumo:
Do commencing students possess the level of information literacy (IL) knowledge and skills they need to succeed at university? What impact does embedding IL within the engineering and design curriculum have? This paper reports on the self-perception versus the reality of IL knowledge and skills, across a large cohort of first year built environment and engineering students. Acting on the findings of this evaluation, the authors (a team of academic librarians) developed an intensive IL skills program which was integrated into a faculty wide unit. Perceptions, knowledge and skills were re-evaluated at the end of the semester to determine if embedded IL education made a difference. Findings reveal that both the perception and reality of IL skills were significantly and measurably improved.