6 resultados para Coins, Swiss
em Queensland University of Technology - ePrints Archive
Resumo:
One of the earliest cryptographic applications of quantum information was to create quantum digital cash that could not be counterfeited. In this paper, we describe a new type of quantum money: quantum coins, where all coins of the same denomination are represented by identical quantum states. We state desirable security properties such as anonymity and unforgeability and propose two candidate quantum coin schemes: one using black box operations, and another using blind quantum computation.
Resumo:
Background Prevention and control of ovine enzootic abortion (OEA) can be achieved by application of a live vaccine. In this study, five sheep flocks with different vaccination and infection status were serologically tested using a competitive enzyme-linked immunosorbent assay (cELISA) specific for Chlamydophila (Cp.) abortus over a two-year time period. Results Sheep in Flock A with recent OEA history had high antibody values after vaccination similar to Flock C with natural Cp. abortus infections. In contrast, OEA serology negative sheep (Flock E) showed individual animal-specific immunoreactions after vaccination. Antibody levels of vaccinated ewes in Flock B ranged from negative to positive two and three years after vaccination, respectively. Positive antibody values in the negative control Flock D (without OEA or vaccination) are probably due to asymptomatic intestinal infections with Cp. abortus. Excretion of the attenuated strain of Cp. abortus used in the live vaccine through the eye was not observed in vaccinated animals of Flock E. Conclusion The findings of our study indicate that, using serology, no distinction can be made between vaccinated and naturally infected sheep. As a result, confirmation of a negative OEA status in vaccinated animals by serology cannot be determined.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
Resumo:
This study focuses on the experiences of 91 Grade 4 students who had been introduced to expectation and variation through trials of tossing a single coin many times. They were then given two coins to toss simultaneously and asked to state their expectation of the chances for the possible outcomes, in a similar manner expressed for a single coin. This paper documents the journey of the students in discovering that generally their initial expectation for two coins was incorrect and that despite variation, a large number of tosses could confirm a new expectation.
Resumo:
Previous research identifies various reasons companies invest in information technology (IT), often as a means to generate value. To add to the discussion of IT value generation, this study investigates investments in enterprise software systems that support business processes. Managers of more than 500 Swiss small and medium-sized enterprises (SMEs) responded to a survey regarding the levels of their IT investment in enterprise software systems and the perceived utility of those investments. The authors use logistic and ordinary least squares regression to examine whether IT investments in two business processes affect SMEs' performance and competitive advantage. Using cluster analysis, they also develop a firm typology with four distinct groups that differ in their investments in enterprise software systems. These findings offer key implications for both research and managerial practice.