340 resultados para European literature
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
The topics of corruption and tax evasion have attracted significant attention in the literature in recent years. We build on that literature by investigating empirically: (1) whether attitudes toward corruption and tax evasion vary systematically with gender and (2) whether gender differences decline as men and women face similar opportunities for illicit behavior. We use data on eight Western European countries from the World Values Survey and the European Values Survey. The results reveal significantly greater aversion to corruption and tax evasion among women. This holds across countries and time, and across numerous empirical specifications. (JEL H260, D730, J160, Z130)
Resumo:
Aim: There has been no systematic research on the role of cooking skills for improving dietary intakes in Australia. Cooking skills are proposed to be declining and/or being devalued. If cooking skills have been devalued and declining, then what evidence is there for this decline and what impact might this have on dietary intakes? The aim of the present paper is to explore these assumptions with particular reference to Australia. The objectives of the present paper are to define the terms cooking and cooking skills, discuss evidence on levels of cooking skills in Australia and describe the evidence linking cooking skills to dietary intakes.---------- Methods: A review of the peer-reviewed literature using multiple databases from 1990 to September 2009.---------- Results: Cooking skills are complex and require a range of processes for people to develop efficiency or confidence in food preparation. There is little evidence on the level of cooking skills in the Australian population and how this relates to dietary intakes. The Australian Bureau of Statistic’s latest Time Use Survey and Household Expenditure Survey suggest that cooking is still a gendered activity and that the time devoted to cooking has changed little in the past 15 years, but there is an increasing use of foods prepared outside the home.---------- Conclusion: Further research is required to examine the prevalence of different types and levels of cooking skills in Australia as well as their potential effects on dietary intakes. Dietitians need evidence about the level of cooking skills people require for healthy dietary intakes.
Resumo:
Poor patient compliance with peritoneal dialysis (PD) has significant adverse effects on morbidity and mortality rates in individuals with chronic kidney disease (CKD). It also adds to the resource burdens of healthcare services and providers. This paper explores the notion of PD compliance in patients with CKD with reference to the relevant published literature. The analysis of the literature reveals that ‘PD compliance’ is a complex and challenging construct for both patients and health professionals. There is no universal definition of compliance that is widely adopted in practice and research, and therefore a lack of consensus on how to determine ‘compliant’ patient outcomes. There are also multiple and interconnected determinants of PD compliance that are context-bound, which healthcare professionals must be aware of, and which makes producing consensus of measuring PD compliance difficult. The complexity of the interventions required to produce even a modest improvement in PD compliance, which are described in this paper, are significant. Compliance with PD and other treatments for CKD is a multidimensional, context-bound concept, that to date has tended to efface the role and needs of the renal patient. We conclude the paper with the implications for contemporary practice.
Resumo:
The detached housing scheme is a unique and exclusive segment of the residential property market in Malaysia. Generally, the product is expensive and for many Malaysians who can afford them, owning a detached house is a once in a lifetime opportunity. In spite of this, most of the owners fail to fully comprehend the specific need of this type of housing scheme, increasing the risk of it being a problematic project. Unlike other types of pre-designed ‘mass housing’ schemes, the detached housing scheme may be built specifically to cater the needs and demands of its owner. Therefore, maximum owner participation is vital as the development progresses to guarantee the success of the project. In addition, due to it’s unique design the house would have to individually comply with the requirements and regulations of relevant authorities. Failure of owner to recognise this will result in delays, fines and penalties, disputes and ultimately cost overruns. These circumstances highlight the need for a model to guide the owner through the entire development process of a detached house. Therefore, this research aims to develop a model for a successful detached housing development in Malaysia through maximising owner participation during it’s various development stages. To achieve this, questionnaire surveys and case studies methods shall be employed to acquire the detached housing owners’ experiences in developing their detached houses in Malaysia. Relevant statistical tools shall be applied to analyse the responses. The results gained from this study shall be synthesised into a model of successful detached housing development for the reference of future detached housing owners in Malaysia.
Resumo:
Research Question/Issue: Over the last four decades, research on the relationship between boards of directors and strategy has proliferated. Yet to date there is little theoretical and empirical agreement regarding the question of how boards of directors contribute to strategy. This review assesses the extant literature by highlighting emerging trends and identifying several avenues for future research. Research Findings/Results: Using a content-analysis of 150 articles published in 23 management journals up to 2007, we describe and analyze how research on boards of directors and strategy has evolved over time. We illustrate how topics, theories, settings, and sources of data interact and influence insights about board–strategy relationships during three specific periods. Theoretical Implications: Our study illustrates that research on boards of directors and strategy evolved from normative and structural approaches to behavioral and cognitive approaches. Our results encourage future studies to examine the impact of institutional and context-specific factors on the (expected) contribution of boards to strategy, and to apply alternative methods to fully capture the impact of board processes and dynamics on strategy making. Practical Implications: The increasing interest in boards of directors’ contribution to strategy echoes a movement towards more strategic involvement of boards of directors. However, best governance practices and the emphasis on board independence and control may hinder the board contribution to the strategic decision making. Our study invites investors and policy-makers to consider the requirements for an effective strategic task when they nominate board members and develop new regulations.
Resumo:
In a competitive environment, companies continuously innovate to offer superior services at lower costs. ‘Shared Services’ have been extensively adopted in practice as a means for improving organizational performance. Shared Services are considered most appropriate for support functions and are widely adopted in human resource management, finance and accounting, and more recently employed as an information systems (IS) function. As computer-based corporate information systems have become de facto and the backbone of administrative systems, the technical impediments to sharing have come down dramatically. As this trend continues, CIOs and IT professionals need a deeper understanding of the Shared Services phenomenon. Yet, analysis of IS academic literature reveals that Shared Services, though mentioned in more than 100 articles, has received little in depth attention. This paper investigates the current status of Shared Services in IS literature. The authors present a detailed review of literature from main IS journals and conferences. The paper concludes with a tentative operational definition, a list of perceived main objectives of Shared Services, and an agenda for related future research.
Resumo:
The 1990 European Community was taken by surprise, by the urgency of demands from the newly-elected Eastern European governments to become member countries. Those governments were honouring the mass social movement of the streets, the year before, demanding free elections and a liberal economic system associated with “Europe”. The mass movement had actually been accompanied by much activity within institutional politics, in Western Europe, the former “satellite” states, the Soviet Union and the United States, to set up new structures – with German reunification and an expanded EC as the centre-piece. This paper draws on the writer’s doctoral dissertation on mass media in the collapse of the Eastern bloc, focused on the Berlin Wall – documenting both public protests and institutional negotiations. For example the writer as a correspondent in Europe from that time, recounts interventions of the German Chancellor, Helmut Kohl, at a European summit in Paris nine days after the “Wall”, and separate negotiations with the French President, Francois Mitterrand -- on the reunification, and EU monetary union after 1992. Through such processes, the “European idea” would receive fresh impetus, though the EU which eventuated, came with many altered expectations. It is argued here that as a result of the shock of 1989, a “social” Europe can be seen emerging, as a shared experience of daily life -- especially among people born during the last two decades of European consolidation. The paper draws on the author’s major research, in four parts: (1) Field observation from the strategic vantage point of a news correspondent. This includes a treatment of evidence at the time, of the wishes and intentions of the mass public (including the unexpected drive to join the European Community), and those of governments, (e.g. thoughts of a “Tienanmen Square solution” in East Berlin, versus the non-intervention policies of the Soviet leader, Mikhail Gorbachev). (2) A review of coverage of the crisis of 1989 by major news media outlets, treated as a history of the process. (3) As a comparison, and a test of accuracy and analysis; a review of conventional histories of the crisis appearing a decade later.(4) A further review, and test, provided by journalists responsible for the coverage of the time, as reflection on practice – obtained from semi-structured interviews.
Resumo:
Driver aggression is a road safety issue of growing concern throughout most highly motorised countries, yet to date there is no comprehensive model that deals with this issue in the road safety area. This paper sets out to examine the current state of research and theory on aggressive driving with a view to incorporating useful developments in the area of human aggression from mainstream psychological research. As a first step, evidence regarding the prevalence and incidence of driver aggression, including the impact of the phenomenon on crash rates is reviewed. Inconsistencies in the definition and operationalisation of driver aggression that have hampered research in the area are noted. Existing models of driver aggression are then identified and the need to distinguish and address the role of intentionality as well as the purpose of perpetrating behaviours within both these and research efforts is highlighted. Drawing on recent findings from psychological research into general aggression, it is argued that progress in understanding driver aggression requires models that acknowledge not only the person-related and situational factors, but the cognitive and emotional appraisal processes involved in driver aggression. An effective model is expected to allow the explanation of not only the likelihood and severity of driver aggression behaviours, but also the escalation of incidents within the context of the road environment.
Resumo:
This paper will focus on the literature review for Goreen Narrkwarren Ngrn-toura- Healthy Family Air, formerly known as Reducing smoking amongst pregnant Aboriginal women in Victoria: An Holistic Approach. Before we outline the findings from the literature review, we will provide some background information on the project, including why it is important and what and who are involved.
Resumo:
The central argument of this work is that “democratic constitutional legitimacy”[2] probably does not currently exist in the politics of any country internationally. This inherent problem in constitutionalism is an endemic governance problem most citizenries should be dealing with, only that we are not in a large extent doing so and haven’t been historically. This position was ascertained using a form of Beck and Grande’s (2010) cosmopolitan methodology in my doctoral thesis (which we shall return to). It is argued that every constitution is in need of considerable rethinking so as to bring its statutes in line with the interests of the plurality of individuals it oversees. Finally, this work attempts to show that research in this area of democratic constitutional legitimacy is lacking in the literature as only a few scholars presently engage the issue (namely Simone Chambers).
Resumo:
This article argues for exploring lesbian, gay, bisexual, and transgender (LGBT) young people’s experiences with police. While research examines how factors such as indigeneity influence young peoples’ experiences with police, how sexuality and/or gender identity mediates these relationships remains largely unexplored. Key bodies of research suggest a need to explore this area further, including: literature documenting links between homophobic violence against LGBT young people and outcomes such as homelessness that fall within the gambit of policing work; research showing reluctance of LGBT communities to report crime to police; international research documenting homophobic police attitudes and Australian research demonstrating arguably homophobic court outcomes; and research outlining increasing police support of LGBT communities. Drawing on these bodies of literature, this article argues that LGBT young people experience policing warrants further research.
Resumo:
This article looks at a Chinese Web 2.0 original literature site, Qidian, in order to show the coevolution of market and non-market initiatives. The analytic framework of social network markets (Potts et al., 2008) is employed to analyse the motivations of publishing original literature works online and to understand the support mechanisms of the site, which encourage readers’ willingness to pay for user-generated content. The co-existence of socio-cultural and commercial economies and their impact on the successful business model of the site are illustrated in this case. This article extends the concept of social network markets by proposing the existence of a ripple effect of social network markets through convergence between PC and mobile internet, traditional and internet publishing, and between publishing and other cultural industries. It also examines the side effects of social network markets, and the role of market and non-market strategies in addressing the issues.