68 resultados para Compromise of 1850.
em Queensland University of Technology - ePrints Archive
Resumo:
Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
In preparation for the introduction of human papillomavirus (HPV) vaccine, we investigated awareness and knowledge of HPV/HPV vaccine and potential acceptability to HPV vaccine among mothers with a teenage daughter in Weihai, Shandong, China. A cross-sectional survey was conducted in 2013 with a sample of 1850 mothers who had a daughter (aged 9–17 years) attending primary, junior and senior high schools. In the final sample (N = 1578, response rate 85.30%), awareness of HPV was reported by 305 (19.32%) mothers. Awareness varied significantly by daughter’s age (P<0.01), mother’s education level (P<0.01), mother’s occupation (P<0.01), household income (P<0.01) and residence type (P<0.01). Knowledge about HPV/HPV vaccine was poor with a mean total score of 3.56 (SD = 2.40) out of a possible score of 13. Mothers with a higher education level reported higher levels of knowledge (P = 0.02). Slightly more than one-fourth (26.49%) of mothers expressed their potential acceptability of HPV vaccine for their daughters. Acceptability increased along with increased daughters’ age (P<0.01), household income (P<0.01) and knowledge level (P<0.01). House wives and unemployed mothers had the highest acceptability (P<0.01). The most common reasons for not accepting HPV vaccination were “My daughter is too young to have risk of cervical cancer (30.95%)”, “The vaccine has not been widely used, and the decision will be made after it is widely used (24.91%)”, “Worry about the safety of the vaccine (22.85%)”. Awareness and knowledge of HPV/HPV vaccines are poor and HPV vaccine acceptability is low among these Chinese mothers. These results may help inform appropriate health education programs in this population.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Using retinal imaging, the nature and extent of compromise of retinal structural integrity has been characterized in individuals suffering from diabetic peripheral neuropathy. These findings extend our understanding of the pathological processes involved in diabetic neuropathy and offer novel ophthalmic approaches to the diagnosis and monitoring of this debilitating condition.
Resumo:
In Hewitt v Bayntum & Allianz Australia Insurance Ltd [2015] QSC 250 the court was asked to sanction a compromise of a proceeding by a plaintiff who, though a recovering drug addict, was able to give instructions and understand the proposed compromise.
Resumo:
There is a category of film about journalism in which journalism is not the star, but the supporting player, and journalists not the protagonists but the Greek chorus, commenting on and also changing the realities they report. In such films the news media are a structuring presence driving the plot, shaping the narrative, constructing what we might think of as a pseudo-reality. Like Daniel Boorstin’s notion of the pseudo-event (introduced in his still-relevant book The Image, 1962), this pseudo-reality is so-named because it would not exist were it not for the demands of the news media’s hunger for stories, and knowledge of the damage they can do with those stories, on the calculations and actions of the key actors. Pseudo-realities form as responses to what political actors think journalists and their organisations need and want, or as efforts to shape journalistic accounts in ways favourable to themselves. Films about politics often feature pseudorealities of this kind, in which the events and actions driving the plot have only a tenuous relationship with important things going on in the everyday world beyond the political arena. Everything we see is about image, perception, appearance.
Resumo:
In Uniline Australia Ltd ACN 010752057 v S Briggs Pty Ltd ACN 007415518 (No 2) [2009] FCA 920 Greenwood J considered a number of principles guiding the exercise of discretion in relation to costs, particularly when offers of compromise have been made under the formal process provided by the Federal Court Rules.
Resumo:
‘Conditions of Compromise and Failure (The Dickensian Aspect)' acts as a re-enactment of the common trope of television detective dramas. A result of the artist’s repeated immersions in the television program ‘The Wire’, the work forms a node-map of all the named characters featured on the show. While each coloured thread represents and connects together the Byzantine narrative between all of the characters, the sheer mass of connections obfuscates any clear reading at all.
Resumo:
Bid opening in e-auction is efficient when a homomorphic secret sharing function is employed to seal the bids and homomorphic secret reconstruction is employed to open the bids. However, this high efficiency is based on an assumption: the bids are valid (e.g., within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunately, validity verification of the bids is ignored in the auction schemes employing homomorphic secret sharing (called homomorphic auction in this paper). In this paper, an attack against the homomorphic auction in the absence of bid validity check is presented and a necessary bid validity check mechanism is proposed. Then a batch cryptographic technique is introduced and applied to improve the efficiency of bid validity check.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Porous mesopore-bioglass (MBG) scaffolds have been proposed as a new class of bone regeneration materials due to their apatite-formation and drug-delivery properties; however, the material’s inherent brittleness and high degradation and surface instability are major disadvantages, which compromise its mechanical strength and cytocompatibility as a biological scaffold. Silk, on the other hand, is a native biomaterial and is well characterized with respect to biocompatibility and tensile strength. In this study we set out to investigate what effects blending silk with MBG had on the physiochemical, drug-delivery and biological properties of MBG scaffolds with a view to bone tissue engineering applications. Transmission electron microscopy (TEM), scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR) were the methods used to analyze the inner microstructure, pore size and morphology, and composition of MBG scaffolds, before and after addition of silk. The effect of silk modification on the mechanical property of MBG scaffolds was determined by testing the compressive strength of the scaffolds and also compressive strength after degradation over time. The drug-delivery potential was evaluated by the release of dexamethasone (DEX) from the scaffolds. Finally, the cytocompatibility of silk-modified scaffolds was investigated by the attachment, morphology, proliferation, differentiation and bone-relative gene expression of bone marrow stromal cells (BMSCs). The results showed that silk modification improved the uniformity and continuity of pore network of MBG scaffolds, and maintained high porosity (94%) and large-pore size (200–400 mm). There was a significant improvement in mechanical strength, mechanical stability, and control of burst release of DEX in silkmodified MBG scaffolds. Silk modification also appeared to provide a better environment for BMSC attachment, spreading, proliferation, and osteogenic differentiation on MBG scaffolds.
Resumo:
Cultural issues have become an increasingly important consideration in healthcare. Such cultural issues, however, are underresearched in Australia, especially in palliative care. This study has sought to address this gap, exploring the social construction of cultural issues in palliative care by oncology nurses. A grounded theory approach was used. Semistructured interviews with 7 Australian oncology nurses provided the data for the study. The core category emerging from the study was that of accommodating cultural needs whereby to meet patients' specific cultural requirements, nurses actively found ways to accommodate the needs of patients and their families. This process often included compromise and negotiation whereby limits were set. In addition, the use of cross-cultural communication strategies emerged from the data as an important feature of cultural care. A series of subcategories were also identified as factors that could influence the process by which nurses would accommodate cultural needs.
Resumo:
To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on lin- ear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciphers, an example of stream ciphers based on dynamic tables, and inves- tigate its implications to potential algebraic attacks on the cipher. This is, to our knowledge, the first pa- per that evaluates the security of RC4 against alge- braic attacks through providing a full set of equations that describe the complex word manipulations in the system. For an arbitrary word size, we derive alge- braic representations for the three main operations used in RC4, namely state extraction, word addition and state permutation. Equations relating the inter- nal states and keystream of RC4 are then obtained from each component of the cipher based on these al- gebraic representations, and analysed in terms of their contributions to the security of RC4 against algebraic attacks. Interestingly, it is shown that each of the three main operations contained in the components has its own unique algebraic properties, and when their respective equations are combined, the resulting system becomes infeasible to solve. This results in a high level of security being achieved by RC4 against algebraic attacks. On the other hand, the removal of an operation from the cipher could compromise this security. Experiments on reduced versions of RC4 have been performed, which confirms the validity of our algebraic analysis and the conclusion that the full RC4 stream cipher seems to be immune to algebraic attacks at present.