170 resultados para Signature


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access keys and tokens in a connected world. Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password, and are helpful against only a subset of the possible attackers. After briefly reviewing a variety of approaches, we propose a user-centric comprehensive model to capture the possible threats posed by online and offline attackers, from the outside and the inside, against the security of both the plaintext and the password. We then propose a few very simple protocols, adapted from the Ford-Kaliski server-assisted password generator and the Boldyreva unique blind signature in particular, that provide the best protection against all kinds of threats, for all distributions of secrets. We also quantify the concrete security of our approach in terms of online and offline password guesses made by outsiders and insiders, in the random-oracle model. The main contribution of this paper lies not in the technical novelty of the proposed solution, but in the identification of the problem and its model. Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion that requires no change to protocols or infrastructure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Previous group signature constructions did not provide any disclosure capability, or at best a very limited one (such as subset membership). Our scheme offers a very powerful language for disclosing exactly in what capacity a subgroup of signers is making a signature on behalf of the group.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim Evidence linking the accumulation of exotic species to the suppression of native diversity is equivocal, often relying on data from studies that have used different methods. Plot-level studies often attribute inverse relationships between native and exotic diversity to competition, but regional abiotic filters, including anthropogenic influences, can produce similar patterns.We seek to test these alternatives using identical scale-dependent sampling protocols in multiple grasslands on two continents. Location Thirty-two grassland sites in North America and Australia. Methods We use multiscale observational data, collected identically in grain and extent at each site, to test the association of local and regional factors with the plot-level richness and abundance of native and exotic plants. Sites captured environmental and anthropogenic gradients including land-use intensity, human population density, light and soil resources, climate and elevation. Site selection occurred independently of exotic diversity, meaning that the numbers of exotic species varied randomly thereby reducing potential biases if only highly invaded sites were chosen. Results Regional factors associated directly or indirectly with human activity had the strongest associations with plot-level diversity. These regional drivers had divergent effects: urban-based economic activity was associated with high exotic : native diversity ratios; climate- and landscape-based indicators of lower human population density were associated with low exotic : native ratios. Negative correlations between plot-level native and exotic diversity, a potential signature of competitive interactions, were not prevalent; this result did not change along gradients of productivity or heterogeneity. Main conclusion We show that plot-level diversity of native and exotic plants are more consistently associatedwith regional-scale factors relating to urbanization and climate suitability than measures indicative of competition. These findings clarify the long-standing difficulty in resolving drivers of exotic diversity using single-factor mechanisms, suggesting that multiple interacting anthropogenic-based processes best explain the accumulation of exotic diversity in modern landscapes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead and computing efficiency are two parameters to be taken into account when designing a multicast stream protocol. In this paper, we propose to use two families of erasure codes to deal with this problem, namely, rateless codes and maximum distance separable codes. Our constructions will have the following advantages. First, our packet overhead will be small. Second, the number of signature verifications to be performed at the receiver is O(1). Third, every receiver will be able to recover all the original data packets emitted by the sender despite losses and injection occurred during the transmission of information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The primary motivation for signcryption was the gain in efficiency when both encryption and signing need to be performed. These two cryptographic operations may be done sequentially either by first encrypt and then sign (EtS) or alternatively, by first sign and then encrypt (StE). Further gains in efficiency can be achieved if encryption and signature are carried out in parallel (E&S). More importantly, however, is that these efficiency gains are complemented by gains in security, i.e., we may use relative weak encryption and signature schemes in order to obtain a “stronger” signcryption scheme. The reader is referred to Chaps. 2 and 3 for a discussion of the different “strengths” of security model (e.g., outsider vs. insider adversaries, two-user vs. multi-user setting).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aground-based tracking camera and coaligned slitless spectrograph were used to measure the spectral signature of visible radiation emitted from the Hayabusa capsule as it entered into the Earth’s atmosphere in June 2010. Good quality spectra were obtained, which showed the presence of radiation from the heat shield of the vehicle and the shock-heated air in front of the vehicle. An analysis of the blackbody nature of the radiation concluded that the peak average temperature of the surface was about (3100± 100)K. Line spectra from oxygen and nitrogen atoms were used to infer a peak average shock-heated gas temperature of around((7000±400))K.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The field of research of epithelial-mesenchymal transitions, EMT, and its reverse, mesenchymal-epithelial transitions, MET, has expanded very rapidly indeed from its beginnings, heralded by Professor Betty Hay in the 1970s and 1980s. This expansion has involved the realisation that the EMT was not just an interesting phenomenon of early developmental morphogenetic cell behaviour, but bore remarkable resemblance to clinically crucial pathological events in cancer invasion. Not surprisingly, this discipline soon became numerically dominant in the EMT publication field. Simultaneously, the EMT concept has been extended to normal physiological wound healing. Exploration revealed that these resemblances were more than skin deep: the same sets of growth factors, receptors, transcription factors, epigenetic marks and signalling pathways turned up repeatedly in EMTs and METs in a variety of contexts, both pathological and normal. This molecular genetic research in turn uncovered similarities of the EMT signature to that of fibrosis, a set of diseases which is of enormous clinical importance, rivalling that of cancer. Most recently, and more surprisingly, the EMT signature has shown considerable similarity to that found in stem cell and cancer stem cell biology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Person re-identification is particularly challenging due to significant appearance changes across separate camera views. In order to re-identify people, a representative human signature should effectively handle differences in illumination, pose and camera parameters. While general appearance-based methods are modelled in Euclidean spaces, it has been argued that some applications in image and video analysis are better modelled via non-Euclidean manifold geometry. To this end, recent approaches represent images as covariance matrices, and interpret such matrices as points on Riemannian manifolds. As direct classification on such manifolds can be difficult, in this paper we propose to represent each manifold point as a vector of similarities to class representers, via a recently introduced form of Bregman matrix divergence known as the Stein divergence. This is followed by using a discriminative mapping of similarity vectors for final classification. The use of similarity vectors is in contrast to the traditional approach of embedding manifolds into tangent spaces, which can suffer from representing the manifold structure inaccurately. Comparative evaluations on benchmark ETHZ and iLIDS datasets for the person re-identification task show that the proposed approach obtains better performance than recent techniques such as Histogram Plus Epitome, Partial Least Squares, and Symmetry-Driven Accumulation of Local Features.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Epithelial mesenchymal transition (EMT) has long been associated with breast cancer cell invasiveness and evidence of EMT processes in clinical samples is growing rapidly. Genome-wide transcriptional profiling of increasingly larger numbers of human breast cancer (HBC) cell lines have confirmed the existence of a subgroup of cell lines (termed Basal B/Mesenchymal) with enhanced invasive properties and a predominantly mesenchymal gene expression signature, distinct from subgroups with predominantly luminal (termed Luminal) or mixed basal/luminal (termed Basal A) features (Neve et al Cancer Cell 2006). Studies providing molecular and cellular analyses of EMT features in these cell lines are summarised, and the expression levels of EMT-associated factors in these cell lines are analysed. Recent clinical studies supporting the presence of EMT-like changes in vivo are summarised. Human breast cancer cell lines with mesenchymal properties continue to hold out the promise of directing us towards key mechanisms at play in the metastatic dissemination of breast cancer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, the tissue origin of MDA-MB-435 cell line has been the subject of considerable debate. In this study, we set out to determine whether MDA-MB-435-DTP cells shown to express melanoma-specific genes were identical to various other MDA-MB-435 cell stocks worldwide. CGH-microarray, genetic polymorphism genotyping, microsatellite fingerprint analysis and/or chromosomal number confirmed that the MDA-MB-435 cells maintained at the Lombardi Comprehensive Cancer Center (MDA-MB-435-LCC) are almost identical to the MDA-MB-435-DTP cells, and showed a very similar profile to those obtained from the same original source (MD Anderson Cancer Center) but maintained independently (MDA-MB-435-PMCC). Gene expression profile analy-sis confirmed common expression of genes among different MDA-MB-435-LCC cell stocks, and identified some unique gene products in MDA-MB-435-PMCC cells. RT-PCR analysis confirmed the expression of the melanoma marker tyrosinase across multiple MDA-MB-435 cell stocks. Collectively, our results show that the MDA-MB-435 cells used widely have identical origins to those that exhibit a melanoma-like gene expression signature, but exhibit a small degree of genotypic and phenotypic drift.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We review here the recently emerging relationship between epithelial-mesenchymal transition (EMT) and breast cancer stem cells (BCSC), and provide analyses of published data on human breast cancer cell lines, supporting their utility as a model for the EMT/BCSC state. Genome-wide transcriptional profiling of these cell lines has confirmed the existence of a subgroup with mesenchymal tendencies and enhanced invasive properties ('Basal B'/Mesenchymal), distinct from subgroups with either predominantly luminal ('Luminal') or mixed basal/luminal ('Basal A') features (Neve et al. Cancer Cell, 2006). A literature-derived EMT gene signature has shown specific enrichment within the Basal B subgroup of cell lines, consistent with their over-expression of various EMT transcriptional drivers. Basal B cell lines are found to resemble BCSC, being CD44highCD24low. Moreover, gene products that distinguish Basal B from Basal A and Luminal cell lines (Basal B Discriminators) showed close concordance with those that define BCSC isolated from clinical material, as reported by Shipitsin et al. (Cancer Cell, 2007). CD24 mRNA levels varied across Basal B cell lines, correlating with other Basal B Discriminators. Many gene products correlating with CD24 status in Basal B cell lines were also differentially expressed in isolated BCSC. These findings confirm and extend the importance of the cellular product of the EMT with Basal B cell lines, and illustrate the value of analysing these cell lines for new leads that may improve breast cancer outcomes. Gene products specific to Basal B cell lines may serve as tools for the detection, quantification, and analysis of BCSC/EMT attributes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper introduces a minimalistic approach to produce a visual hybrid map of a mobile robot’s working environment. The proposed system uses omnidirectional images along with odometry information to build an initial dense posegraph map. Then a two level hybrid map is extracted from the dense graph. The hybrid map consists of global and local levels. The global level contains a sparse topological map extracted from the initial graph using a dual clustering approach. The local level contains a spherical view stored at each node of the global level. The spherical views provide both an appearance signature for the nodes, which the robot uses to localize itself in the environment, and heading information when the robot uses the map for visual navigation. In order to show the usefulness of the map, an experiment was conducted where the map was used for multiple visual navigation tasks inside an office workplace.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we tackle the problem of finding an efficient signature verification scheme when the number of signatures is signi.- cantly large and the verifier is relatively weak. In particular, we tackle the problem of message authentication in many-to-one communication networks known as concast communication. The paper presents three signature screening algorithms for a variant of ElGamal-type digital signatures. The cost for these schemes is n applications of hash functions, 2n modular multiplications, and n modular additions plus the verification of one digital signature, where n is the number of signatures. The paper also presents a solution to the open problem of finding a fast screening signature for non-RSA digital signature schemes.