4 resultados para Secret Sharing Schemes

em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper sets forth a Neo-Kaleckian model of capacity utilization and growth with distribution featuring a profit-sharing arrangement. While a given proportion of firms compensate workers with only a base wage, the remaining proportion do so with a base wage and a share of profits. Consistent with the empirical evidence, workers hired by profit-sharing firms have a higher productivity than their counterparts in base-wage firms. While a higher profit-sharing coefficient raises capacity utilization and growth irrespective of the distribution of compensation strategies across firms, a higher frequency of profit-sharing firms does likewise only if the profit-sharing coefficient is sufficiently high.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a new family of survival distributions is presented. It is derived by considering that the latent number of failure causes follows a Poisson distribution and the time for these causes to be activated follows an exponential distribution. Three different activation schemes are also considered. Moreover, we propose the inclusion of covariates in the model formulation in order to study their effect on the expected value of the number of causes and on the failure rate function. Inferential procedure based on the maximum likelihood method is discussed and evaluated via simulation. The developed methodology is illustrated on a real data set on ovarian cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Paulo CA, Roschel H, Ugrinowitsch C, Kobal R and Tricoli V. Influence of different resistance exercise loading schemes on mechanical power output in work to rest ratio-equated and -nonequated conditions. J Strength Cond Res 26(5): 1308-1312, 2012-It is well known that most sports are characterized by the performance of intermittent high-intensity actions, requiring high muscle power production within different intervals. In fact, the manipulation of the exercise to rest ratio in muscle power training programs may constitute an interesting strategy when considering the specific performance demand of a given sport modality. Thus, the aim of this study was to evaluate the influence of different schemes of rest intervals and number of repetitions per set on muscle power production in the squat exercise between exercise to rest ratio-equated and -nonequated conditions. Nineteen young males (age: 25.7 +/- 4.4 years; weight: 81.3 +/- 13.7 kg; height: 178.1 +/- 5.5 cm) were randomly submitted to 3 different resistance exercise loading schemes, as follows: short-set short-interval condition (SSSI; 12 sets of 3 repetitions with a 27.3-second interval between sets); short-set long-interval condition (SSLI; 12 sets of 3 repetitions with a 60-second interval between sets); long-set long-interval (LSLI; 6 sets of 6 repetitions with a 60-second rest interval between sets). The main finding of the present study is that the lower exercise to rest ratio protocol (SSLI) resulted in greater average power production (601.88 +/- 142.48 W) when compared with both SSSI and LSLI (581.86 +/- 113.18 W; 578 +/- 138.78 W, respectively). Additionally, both the exercise to rest ratio-equated conditions presented similar performance and metabolic results. In summary, these findings suggest that shorter rest intervals may fully restore the individual's ability to produce muscle power if a smaller exercise volume per set is performed and that lower exercise to rest ratio protocols result in greater average power production when compared with higher ratio ones.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.