28 resultados para Canetti, Elias
em Queensland University of Technology - ePrints Archive
Resumo:
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
For over a decade, IT expenditure in China and Malaysia has shown a significant increase, as organisations in these countries are increasingly dependent on information systems (IS) for achieving strategic advantages and business benefits. However, there have been numerous reports of dissatisfaction with IS, and in some cases the effectiveness of the information systems have yet to be reviewed. Two exploratory case studies reported in this paper are the first phase of an overall research in validating the IS-Impact model introduced by Gable, Sedera and Chan in two countries: China and Malaysia. This validation research aims to produce a standard measuring model across different contexts. The purpose of this paper is to present preliminary findings from two exploratory case studies, attempt to test the feasibility of the research design and to investigate applicability of the IS-Impact model in Chinese and Malaysian organisations. Twenty-nine respondents from a Chinese private company and seventeen respondents from a state government in Malaysia were involved in these studies. Findings indicated that most of existing IS-Impact measures are applicable in the study contexts, however, there are some new measures informed by the respondents. Feedback from the case studies also suggested necessary modifications to the Mandarin instrument.
Resumo:
Criminology has tended to treat crime as predominantly an urban phenomenon. A review of the available, albeit rather limited, empirical evidence regarding crime and law and order in rural New South Wales (NSW) raises some doubts about the urban-centric focus of criminology and opens up a range of other interesting questions concerning the differential social construction of crime problems in some rural localities, in particular the tendency to racialise questions of crime and law and order. Rather than simply developing an empirical and theoretical account of urban/rural differences, however, the paper suggests a conceptual framework for local and regional studies drawing on the work of Norbert Elias and Robert Putnam.
Resumo:
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.
Resumo:
The paper compares three different methods of inclusion of current phasor measurements by phasor measurement units (PMUs) in the conventional power system state estimator. For each of the three methods, comprehensive formulation of the hybrid state estimator in the presence of conventional and PMU measurements is presented. The performance of the state estimator in the presence of conventional measurements and optimally placed PMUs is evaluated in terms of convergence characteristics and estimator accuracy. Test results on the IEEE 14-bus and IEEE 300-bus systems are analyzed to determine the best possible method of inclusion of PMU current phasor measurements.
Resumo:
Information Systems researchers have employed a diversity of sometimes inconsistent measures of IS success, seldom explicating the rationale, thereby complicating the choice for future researchers. In response to these and other issues, Gable, Sedera and Chan introduced the IS-Impact measurement model. This model represents “the stream of net benefits from the Information System (IS), to date and anticipated, as perceived by all key-user-groups”. Although the IS-Impact model was rigorously validated in previous research, there is a need to further generalise and validate it in different context. This paper reported the findings of the IS-Impact model revalidation study at four state governments in Malaysia with 232 users of a financial system that is currently being used at eleven state governments in Malaysia. Data was analysed following the guidelines for formative measurement validation using SmartPLS. Based on the PLS results, data supported the IS-Impact dimensions and measures thus confirming the validity of the IS-Impact model in Malaysia. This indicates that the IS-Impact model is robust and can be used across different context.
Resumo:
Although numerous genetic and acquired factors are appreciated as risk factors for venous thromboembolism (VTE) [1,2], only recently have male gender [3,4], dyslipoproteinemia [5], and silent atherosclerotic vascular disease [6] been linked to VTE. We recently found that high-density lipoprotein (HDL) deficiency is a key feature of a pattern of dyslipoproteinemia that is associated with VTE in males, and we found that the common TaqI B1 variation in the cholesteryl ester transfer protein (CETP) gene is significantly linked to VTE [5]. However, the TaqI B1/B2 single nucleotide polymorphism (SNP) itself is unlikely to affect directly CETP activity, but it is linked to nonsynonymous CETP SNPs Ala373Pro and Arg451Gln [7–9]. Here, we demonstrate that these two CETP variations are associated with VTE and low plasma HDL levels in males.
Resumo:
Elevated plasma fibronectin levels occur in various clinical states including arterial disease. Increasing evidence suggests that atherothrombosis and venous thromboembolism (VTE) share common risk factors. To assess the hypothesis that high plasma fibronectin levels are associated with VTE, we compared plasma fibronectin levels in the Scripps Venous Thrombosis Registry for 113 VTE cases vs. age and sex matched controls. VTE cases had significantly higher mean fibronectin concentration compared to controls (127% vs. 103%, p<0.0001); the difference was greater for idiopathic VTE cases compared to secondary VTE cases (133% vs. 120%, respectively). Using a cut-off of >90% of the control values, the odds ratio (OR) for association of VTE for fibronectin plasma levels above the 90th percentile were 9.37 (95% CI 2.73-32.2; p<0.001) and this OR remained significant after adjustment for sex, age, body mass index (BMI), factor V Leiden and prothrombin nt20210A (OR 7.60, 95% CI 2.14-27.0; p=0.002). In particular, the OR was statistically significant for idiopathic VTE before and after these statistical adjustments. For the total male cohort, the OR was significant before and after statistical adjustments and was not significant for the total female cohort. In summary, our results suggest that elevated plasma fibronectin levels are associated with VTE especially in males, and extend the potential association between biomarkers and risk factors for arterial atherothrombosis and VTE. © 2008 Schattauer GmbH.
Resumo:
In summary, these results imply that the relationship of adiponectin with lipoproteins is more complex than previously predicted using other methods of lipoprotein fractionation. Higher correlation of adiponectin was shown with large lipoprotein particle size, independent of the apolipoprotein content. Given the small population studied, we could not assess the influence of mild risk factors for venous thrombosis, such as obesity, on the analysis of the results. Thus, we can only state that adiponectin levels appear not to be a strong risk factor for VTE. It is possible that adiponectin deficiency may contribute indirectly to the etiology of VTE by enhancing the inflammatory state. © 2006 International Society on Thrombosis and Haemostasis.
Resumo:
Background-Although dyslipoproteinemia is associated with arterial atherothrombosis, little is known about plasma lipoproteins in venous thrombosis patients. Methods and Results-We determined plasma lipoprotein subclass concentrations using nuclear magnetic resonance spectroscopy and antigenic levels of apolipoproteins AI and B in blood samples from 49 male venous thrombosis patients and matched controls aged <55 years. Venous thrombosis patients had significantly lower levels of HDL particles, large HDL particles, HDL cholesterol, and apolipoprotein AI and significantly higher levels of LDL particles and small LDL particles. The quartile-based odds ratios for decreased HDL particle and apolipoprotein AI levels in patients compared with controls were 6.5 and 6.0 (95% CI, 2.3 to 19 and 2.1 to 17), respectively. Odds ratios for apolipoprotein B/apolipoprotein AI ratio and LDL cholesterol/HDL cholesterol ratio were 6.3 and 2.7 (95% CI, 1.9 to 21 and 1.1 to 6.5), respectively. When polymorphisms in genes for hepatic lipase, endothelial lipase, and cholesteryl ester transfer protein were analyzed, patients differed significantly from controls in the allelic frequency for the TaqI B1/B2 polymorphism in cholesteryl ester transfer protein, consistent with the observed pattern of lower HDL and higher LDL. Conclusions-Venous thrombosis in men aged <55 years old is associated with dyslipoproteinemia involving lower levels of HDL particles, elevated levels of small LDL particles, and an elevated ratio of apolipoprotein B/apolipoprotein AI. This dyslipoproteinemia seems associated with a related cholesteryl ester transfer protein genotype difference. © 2005 American Heart Association, Inc.