313 resultados para Natural extension
em Queensland University of Technology - ePrints Archive
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
Due to proliferation of online stores prior expectations that retailing would move completely online were not fulfilled. Previous research about consumers’ preference of retailing channels suggested that online sales are driven by the convenience of online shopping, or as a natural extension of online searches. This paradigm has changed over the years. Changes in consumer behaviour are indicating that while consumers are searching online using various information sources to learn about products, ultimately when purchasing, consumers are shifting between online and offline retailing channels depending on various factors. Online shopping is still considered to be a convenient way to purchase goods, but the convenience is not the key factor. This qualitative research is based on 22 in-depth interviews with shoppers in Australia.
Resumo:
Young children are most vulnerable to, and most at risk from, environmental and sustainability challenges. Early education investments aimed at addressing such issues, until recently however, have been neglected or under-rated. Fortunately, this is changing. A groundswell of practitioner interest in early childhood environmental education/ education for sustainability is emerging, in contrast to the ‘patches of green’ that have characterised previous decades. Indeed, an international coalition for early childhood education for sustainability (ECEfS) is beginning to develop, evidenced by The Gothenburg Recommendations on Education for Sustainable Development (2008) that identifies early childhood, within a framework of lifelong learning, as a ‘natural starting point’ for all ongoing education for sustainability. This document is important as it is the first international statement to explicitly identify ECEfS as contributing to education for sustainability. The next challenge for ECEfS is for practitioner mobilisation to be matched by research activity aimed at broadening and deepening practice-based responses. This is the next exciting frontier in the legitimisation of ECEfS.
Resumo:
Value Management (VM) initially started in early 1940s in the US manufacturing industry has increasingly becoming popular within the construction industry community internationally. It has been widely accepted as an important tool in the management of projects. The structured, systematic and multi-disciplinary approach in decision making process is a niche for VM in delivering better value for money project to the client investment. It would appear to be gaining some momentum as an essential management tool in the Malaysian construction sector especially in the quantity surveying practice. Quantity surveyors increasing involvement in VM provides an opportunity for the profession to re-model some of its traditional services in a more positive light and develop leading-edge skills and promote the profession. International practice has associated VM to be part of services offered in the quantity surveying practice; especially in UK has proven to be a natural progression of QS profession. The introduction of VM as early 1980’s in Malaysia combined with increasing demand for construction project to facilitate nation progress is shedding a positive light for quantity surveying profession to take lead in developing VM as one of their niche area. Therefore, the quantity surveying profession having the opportunity to take lead of this service which reflect their traditional attributes for providing the best value-for-money advise to the client. This paper shall discuss on the development of VM in Malaysia and the challenges VM face services in QS firm to remain ahead of their competitors.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.
Resumo:
A computer code is developed for the numerical prediction of natural convection in rectangular two-dimensional cavities at high Rayleigh numbers. The governing equations are retained in the primitive variable form. The numerical method is based on finite differences and an ADI scheme. Convective terms may be approximated with either central or hybrid differencing for greater stability. A non-uniform grid distribution is possible for greater efficiency. The pressure is dealt with via a SIMPLE type algorithm and the use of a fast elliptic solver for the solenoidal velocity correction field significantly reduces computing times. Preliminary results indicate that the code is reasonably accurate, robust and fast compared with existing benchmarks and finite difference based codes, particularly at high Rayleigh numbers. Extension to three-dimensional problems and turbulence studies in similar geometries is readily possible and indicated.
Using the Hofstede-Gray Framework to Argue Normatively for an Extension of Islamic Corporate Reports