336 resultados para Distinguishing Attack
Resumo:
Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.
Resumo:
This study investigated the ability of primary school teachers to recognise and refer children with anxiety symptoms. Two hundred and ninety-nine primary school teachers completed a questionnaire exploring their recognition and referral responses to five hypothetical vignettes that described boys and girls with varying severity of anxiety symptoms. Results revealed that teachers were generally able to recognise and make the decision to refer children with severe levels of anxiety. However, they had difficulty distinguishing between children with moderate anxiety symptoms and a severe anxiety disorder. Female teachers were more likely to refer children than were male teachers. The implications and future research are discussed.
Resumo:
Existing algebraic analyses of the ZUC cipher indicate that the cipher should be secure against algebraic attacks. In this paper, we present an alternative algebraic analysis method for the ZUC stream cipher, where a combiner is used to represent the nonlinear function and to derive equations representing the cipher. Using this approach, the initial states of ZUC can be recovered from 2^97 observed words of keystream, with a complexity of 2^282 operations. This method is more successful when applied to a modified version of ZUC, where the number of output words per clock is increased. If the cipher outputs 120 bits of keystream per clock, the attack can succeed with 219 observed keystream bits and 2^47 operations. Therefore, the security of ZUC against algebraic attack could be significantly reduced if its throughput was to be increased for efficiency.
Resumo:
Both the SSS and SOBER-t32 stream cipher designs use a single word-based shift register and a nonlinear filter function to produce keystream. In this paper we show that the algebraic attack method previously applied to SOBER-t32 is prevented from succeeding on SSS by the use of the key dependent substitution box (SBox) in the nonlinear filter of SSS. Additional assumptions and modifications to the SSS cipher in an attempt to enable algebraic analysis result in other difficulties that also render the algebraic attack infeasible. Based on these results, we conclude that a well chosen key-dependent substitution box used in the nonlinear filter of the stream cipher provides resistance against such algebraic attacks.
Resumo:
This paper reviews the current state in the application of infrared methods, particularly mid-infrared (mid-IR) and near infrared (NIR), for the evaluation of the structural and functional integrity of articular cartilage. It is noted that while a considerable amount of research has been conducted with respect to tissue characterization using mid-IR, it is almost certain that full-thickness cartilage assessment is not feasible with this method. On the contrary, the relatively more considerable penetration capacity of NIR suggests that it is a suitable candidate for full-thickness cartilage evaluation. Nevertheless, significant research is still required to improve the specificity and clinical applicability of the method if we are going to be able to use it for distinguishing between functional and dysfunctional cartilage.
Resumo:
This chapter proposes a conceptual model for optimal development of needed capabilities for the contemporary knowledge economy. We commence by outlining key capability requirements of the 21st century knowledge economy, distinguishing these from those suited to the earlier stages of the knowledge economy. We then discuss the extent to which higher education currently caters to these requirements and then put forward a new model for effective knowledge economy capability learning. The core of this model is the development of an adaptive and adaptable career identity, which is created through a reflective process of career self-management, drawing upon data from the self and the world of work. In turn, career identity drives the individual’s process of skill and knowledge acquisition, including deep disciplinary knowledge. The professional capability learning thus acquired includes disciplinary skill and knowledge sets, generic skills, and also skills for the knowledge economy, including disciplinary agility, social network capability, and enterprise skills. In the final part of this chapter, we envision higher education systems that embrace the model, and suggest steps that could be taken toward making the development of knowledge economy capabilities an integral part of the university experience.
Resumo:
This paper reports on a unique study of a large, random sample of business start-ups that were identified prior to the actual, commercial launch of the ventures. The purpose of this paper is two-fold. First, to present frequencies on the involvement of the Swedish population in the small business sector (particularly in start-ups of firms) and to compare these with estimates from Norway and the USA, which are based on studies using a similar research design. The authors also discuss the possible reasons for the differences that emerge between countries. Second, the characteristics of nascent entrepreneurs (i.e. individuals trying to start an independent business) are analysed and compared for sub-groups within the sample and with characteristics of business founders as they appear in theoretical accounts or retrospective empirical studies of surviving all firms. In order to get a representative sample from the working age population, respondents (n = 30,427) were randomly selected and interviewed by telephone. It was found that 2.0% of the Swedish population at the time of the interview were trying to start an independent business. Sweden had a significantly lower prevalence rate of nascent entrepreneurs compared to Norway and the USA. Nascent entrepreneurs were then compared to a control group of people not trying to start a business. The results confirmed findings from previous studies of business founders pointing to the importance of role models and the impression of self-employment obtained through these, employment status, age, education and experience. Marital status, the number of children in the household, and length of employment experience were unrelated to the probability of becoming a nascent entrepreneur. The gender of the respondent was the strongest distinguishing factor. Importantly, the results suggest that while one has a reasonably good understanding of the characteristics associated with men going into business for themselves, the type of variables investigated here have very limited ability to predict nascent entrepreneur status for women.
Resumo:
A self-escrowed public key infrastructure (SE-PKI) combines the usual functionality of a public-key infrastructure with the ability to recover private keys given some trap-door information. We present an additively homomorphic variant of an existing SE-PKI for ElGamal encryption. We also propose a new efficient SE-PKI based on the ElGamal and Okamoto-Uchiyama cryptosystems that is more efficient than the previous SE-PKI. This is the first SE-PKI that does not suffer from a key doubling problem of previous SE-PKI proposals. Additionally, we present the first self-escrowed encryption schemes secure against chosen-ciphertext attack in the standard model. These schemes are also quite efficient and are based on the Cramer-Shoup cryptosystem, and the Kurosawa-Desmedt hybrid variant in different groups.
Resumo:
The photocatalytic disinfection of Enterobacter cloacae and Enterobacter coli using microwave (MW), convection hydrothermal (HT) and Degussa P25 titania was investigated in suspension and immobilized reactors. In suspension reactors, MW-treated TiO(2) was the most efficient catalyst (per unit weight of catalyst) for the disinfection of E. cloacae. However, HT-treated TiO(2) was approximately 10 times more efficient than MW or P25 titania for the disinfection of E. coli suspensions in surface water using the immobilized reactor. In immobilized experiments, using surface water a significant amount of photolysis was observed using the MW- and HT-treated films; however, disinfection on P25 films was primarily attributed to photocatalysis. Competitive action of inorganic ions and humic substances for hydroxyl radicals during photocatalytic experiments, as well as humic substances physically screening the cells from UV and hydroxyl radical attack resulted in low rates of disinfection. A decrease in colony size (from 1.5 to 0.3 mm) was noted during photocatalytic experiments. The smaller than average colonies were thought to occur during sublethal (•) OH and O(2) (•-) attack. Catalyst fouling was observed following experiments in surface water and the ability to regenerate the surface was demonstrated using photocatalytic degradation of oxalic acid as a model test system
Resumo:
This article argues that multinational banks have characteristics which are unique and distinguishable from traditional multinational entities. The first distinguishing feature is the unique nature of the services and consequent products supplied by multinational banks, which are aimed at meeting client global demand. The second distinguishing feature is the non-traditional organisational structure that is adopted. This structure, also designed to meet client global demand, introduces issues previously not recognised in the traditional taxation system, which is designed for the structure of traditional multinational entities. The unique differences between traditional multinational entities and multinational banks means there may be the need for a distinct international tax regime. It is argued that there are “outmoded economic assumptions” upon which the present tax laws relating to multinational banks are based. An examination of the unique nature of multinational banks leads to the conclusion that the appropriate tax treatment of these banks is different from the appropriate tax treatment of multinational entities generally.
Resumo:
Blends of lignin and poly(hydroxybutyrate) (PHB) were obtained by melt extrusion. They were buried in a garden soil for up to 12 months, and the extent and mechanism of degradation were investigated by gravimetric analysis, thermogravimetric analysis (TGA), differential scanning calorimetry (DSC), X-ray photoelectron spectroscopy (XPS), scanning electron microscopy (SEM) and Fourier transform infra-red spectroscopy (FTIR) over the entire range of compositions. The PHB films were disintegrated and lost 45 wt% of mass within 12 months. This value dropped to 12 wt% of mass when only 10 wt% of lignin was present, suggesting that lignin both inhibited and slowed down the rate of PHB degradation. TGA and DSC indicated structural changes, within the lignin/PHB matrix, with burial time, while FTIR results confirmed the fragmentation of the PHB polymer. XPS revealed an accumulation of biofilms on the surface of buried samples, providing evidence of a biodegradation mechanism. Significant surface roughness was observed with PHB films due to microbial attack caused by both loosely and strongly associated micro-organisms. The presence of lignin in the blends may have inhibited the colonisation of the micro-organisms and caused the blends to be more resistant to microbial attack. Analysis suggested that lignin formed strong hydrogen bonds with PHB in the buried samples and it is likely that the rate of breakdown of PHB is reduced, preventing rapid degradation of the blends.
Resumo:
Purpose Managers generally have discretion in determining how components of earnings are presented in financial statements in distinguishing between ‘normal’ earnings and items classified as unusual, special, significant, exceptional or abnormal. Prior research has found that such intra-period classificatory choice is used as a form of earnings management. Prior to 2001, Australian accounting standards mandated that unusually large items of revenue and expense be classified as ‘abnormal items’ for financial reporting, but this classification was removed from accounting standards from 2001. This move by the regulators was partly in response to concerns that the abnormal classification was being used opportunistically to manage reported pre-abnormal earnings. This study extends the earnings management literature by examining the reporting of abnormal items for evidence of intra-period classificatory earnings management in the unique Australian setting. Design/methodology/approach This study investigates associations between reporting of abnormal items and incentives in the form of analyst following and the earnings benchmarks of analysts’ forecasts, earnings levels, and earnings changes, for a sample of Australian top-500 firms for the seven-year period from 1994 to 2000. Findings The findings suggest there are systematic differences between firms reporting abnormal items and those with no abnormal items. Results show evidence that, on average, firms shifted expense items from pre-abnormal earnings to bottom line net income through reclassification as abnormal losses. Originality/value These findings suggest that the standard setters were justified in removing the ‘abnormal’ classification from the accounting standard. However, it cannot be assumed that all firms acted opportunistically in the classification of items as abnormal. With the removal of the standardised classification of items outside normal operations as ‘abnormal’, firms lost the opportunity to use such disclosures as a signalling device, with the consequential effect of limiting the scope of effectively communicating information about the nature of items presented in financial reports.
Resumo:
Non-state insurgent actors are too weak to compel powerful adversaries to their will, so they use violence to coerce. A principal objective is to grow and sustain violent resistance to the point that it either militarily challenges the state, or more commonly, generates unacceptable political costs. To survive, insurgents must shift popular support away from the state and to grow they must secure it. State actor policies and actions perceived as illegitimate and oppressive by the insurgent constituency can generate these shifts. A promising insurgent strategy is to attack states in ways that lead angry publics and leaders to discount the historically established risks and take flawed but popular decisions to use repressive measures. Such decisions may be enabled by a visceral belief in the power of coercion and selective use of examples of where robust measures have indeed suppressed resistance. To avoid such counterproductive behaviours the cases of apparent 'successful repression' must be understood. This thesis tests whether robust state action is correlated with reduced support for insurgents, analyses the causal mechanisms of such shifts and examines whether such reduction is because of compulsion or coercion? The approach is founded on prior research by the RAND Corporation which analysed the 30 insurgencies most recently resolved worldwide to determine factors of counterinsurgent success. This new study first re-analyses their data at a finer resolution with new queries that investigate the relationship between repression and insurgent active support. Having determined that, in general, repression does not correlate with decreased insurgent support, this study then analyses two cases in which the data suggests repression seems likely to be reducing insurgent support: the PKK in Turkey and the insurgency against the Vietnamese-sponsored regime after their ousting of the Khmer Rouge. It applies 'structured-focused' case analysis with questions partly built from the insurgency model of Leites and Wolf, who are associated with the advocacy of US robust means in Vietnam. This is thus a test of 'most difficult' cases using a 'least likely' test model. Nevertheless, the findings refute the deterrence argument of 'iron fist' advocates. Robust approaches may physically prevent effective support of insurgents but they do not coercively deter people from being willing to actively support the insurgency.
Resumo:
This book was written to serve two functions. First it is an exploration of what I have called Socratic pedagogy, a collaborative inquiry-based approach to teaching and learning suitable not only to formal educational settings such as the school classroom but to all educational settings. The term is intended to capture a variety of philosophical approaches to classroom practice that could broadly be described Socratic in form. The term ‘philosophy in schools’ is ambiguous and could refer to teaching university style philosophy to high school students or to the teaching of philosophy and logic or critical reasoning in senior years of high school. It is also used to describe the teaching of philosophy in schools generally. In the early and middle phases of schooling the term philosophy for children is often used. But this too is ambiguous as the name was adopted from Matthew Lipman’s Philosophy for Children curriculum that he and his colleagues at the Institute for the Advancement of Philosophy for Children developed. In Britain the term ‘philosophy with children’ is sometimes employed to mark two methods of teaching that have Socratic roots but have distinct differences, namely Philosophy for Children and Socratic Dialogue developed by Leonard Nelson. The use of the term Socratic pedagogy and its companion term Socratic classroom (to refer to the kind of classroom that employs Socratic teaching) avoids the problem of distinguishing between various approaches to philosophical inquiry in the Socratic tradition but also separates it from the ‘study of philosophy’, such as university style philosophy or other approaches which place little or no emphasis on collaborative inquiry based teaching and learning. The second function builds from the first. It is to develop an effective framework for understanding the relationship between what I call the generative, evaluative and connective aspects of communal dialogue, which I think are necessary to the Socratic notion of inquiry. In doing so it is hoped that this book offers some way to show how philosophy as inquiry can contribute to educational theory and practice, while also demonstrating how it can be an effective way to approach teaching and learning. This has meant striking a balance between speaking to philosophers and to teachers and educators together, with the view that both see the virtues of such a project. In the strictest sense this book is not philosophy of education, insofar as its chief focus is not on the analysis of concepts or formulation of definitions specific to education with the aim of formulating directives that guide educational practice. It relinquishes the role of philosopher as ‘spectator’, to one of philosopher ‘immersed in matter’ – in this case philosophical issues in education, specifically those related to philosophical inquiry, pedagogy and classroom practice. Put another way, it is a book about philosophical education.
Resumo:
Background China has one of the highest suicide rates in the world; however, the recent trends in suicide have not been adequately studied. This study aimed to examine the potential changes in the rates and characteristics in a Chinese population. Methods Data on suicide deaths in 1991–2010 were extracted from the Shandong Disease Surveillance Point (DSP) mortality dataset based on ICD-10 codes. The temporal trend in age-adjusted suicide rates for each subpopulation was tested using log-linear Poisson regression analysis. Results From 1991 to 2010, there was a marked decrease in the overall suicide rate in Shandong, with an average reduction of 8% per year. The decrease trend was stronger in rural than in urban areas and more evident in females than in males. Similar decreases were observed for all age groups. Pesticide ingestion and hanging remained the top two methods for suicide. Limitations There are likely quality concerns in the morality data, such as underreporting and misclassification, as well as low accuracy in determining the underlying causes of deaths. The representativeness of the DSP system may also be problematic due to the rapid changes in economy and demography. Conclusions Completed suicides in Shandong have sharply declined over the past 20 years. Higher rates in females versus males and in rural versus urban areas, which were previously considered to be distinguishing features of suicide in China, are becoming less pronounced.