50 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security
em University of Queensland eSpace - Australia
Resumo:
Online multimedia data needs to be encrypted for access control. To be capable of working on mobile devices such as pocket PC and mobile phones, lightweight video encryption algorithms should be proposed. The two major problems in these algorithms are that they are either not fast enough or unable to work on highly compressed data stream. In this paper, we proposed a new lightweight encryption algorithm based on Huffman error diffusion. It is a selective algorithm working on compressed data. By carefully choosing the most significant parts (MSP), high performance is achieved with proper security. Experimental results has proved the algorithm to be fast. secure: and compression-compatible.
Resumo:
Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case
Resumo:
Australia is an increasingly important ally for the United States. It is willing to be part of challenging global missions, and its strong economy and growing self-confi dence suggest a more prominent role in both global and regional affairs. Moreover, its government has worked hard to strengthen the link between Canberra and Washington. Political and strategic affi nities between the two countries have been refl ected in--and complemented by--practiced military interoperability, as the two allies have sustained a pattern of security cooperation in relation to East Timor, Afghanistan and Iraq in the last 4 years. This growing collaboration between the two countries suggests that a reinvention of the traditional bilateral security relationship is taking place. At the core of this process lies an agreement about the need for engaging in more proactive strategic behavior in the changing global security environment, and a mutual acceptance of looming military and technological interdependence. But this new alliance relationship is already testing the boundaries of bipartisan support for security policy within Australia. Issues of strategic doctrine, defense planning, and procurement are becoming topics of fi erce policy debate. Such discussion is likely to be sharpened in the years ahead as Australia’s security relationship with the United States settles into a new framework.
Resumo:
The three-dimensional solution structure of the 40 residue amyloid beta-peptide, A beta(1-40), has been determined using NMR spectroscopy at pH 5.1, in aqueous sodium dodecyl sulfate (SDS) micelles, In this environment, which simulates to some extent a water-membrane medium, the peptide is unstructured between residues 1 and 14 which are mainly polar and likely solvated by water. However, the rest of the protein adopts an alpha-helical conformation between residues 15 and 36 with a kink or hinge at 25-27. This largely hydrophobic region is likely solvated by SDS. Based on the derived structures, evidence is provided in support of a possible new location for the transmembrane domain of A beta within the amyloid precursor protein (APP). Studies between pH 4.2 and 7.9 reveal a pH-dependent helix-coil conformational switch. At the lower pH values, where the carboxylate residues are protonated, the helix is uncharged, intact, and lipid-soluble. As the pH increases above 6.0, part of the helical region (15-24) becomes less structured, particularly near residues E22 and D23 where deprotonation appears to facilitate unwinding of the helix. This pH-dependent unfolding to a random coil conformation precedes any tendency of this peptide to aggregate to a beta-sheet as the pH increases. The structural biology described herein for A beta(1-40) suggests that (i) the C-terminal two-thirds of the peptide is an alpha-helix in membrane-like environments, (ii) deprotonation of two acidic amino acids in the helix promotes a helix-coil conformational transition that precedes aggregation, (iii) a mobile hinge exists in the helical region of A beta(1-40) and this may be relevant to its membrane-inserting properties and conformational rearrangements, and (iv) the location of the transmembrane domain of amyloid precursor proteins may be different from that accepted in the Literature. These results may provide new insight to the structural properties of amyloid beta-peptides of relevance to Alzheimer's disease.
Resumo:
Many Archean cratons are surrounded by Proterozoic mobile belts that have experienced episodes of tectonic re-activation over their lifetimes. This suggests that mobile belt lithosphere may be associated with long lived, inherited weakness. It is proposed that the proximity of this weakness can increase the longevity of deep Archean lithosphere by buffering Archean cratons from mantle derived stresses. The physical plausibility of this idea is explored through numerical simulations of mantle convection that include continents and allow for material rheologies that model the combined brittle and ductile behavior of the lithosphere. Within the simulations, the longevity of deep cratonic lithosphere does increase if it is buffered by mobile belts that can fail at relatively low stress levels.
Resumo:
Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.
Resumo:
Mobile Lipids detected using H-1-NMR in stimulated lymphocytes were correlated with cell cycle phase, expression of the interleukin-2 receptor alpha and proliferation to assess the activation status of the lymphocytes. Mobile lipid levels, IL-2R alpha expression and proliferation increased after treatment with PMA and ionomycin. PMA or ionomycin stimulation alone induced increased IL-2R alpha expressiom but not proliferation, PMA- but not ionomycin-stimulation generated mobile lipid, Treatment with anti-CD3 antibody did not increase IL-2R alpha expression or proliferation but did generate increased amounts of mobile lipid, The cell cycle status of thymocytes treated with anti-CD3, PMA or ionomycin alone indicated an. accumulation of the cells in the G(1) phase of the cell cycle, The generation of mobile lipid was abrogated in anti-CD3 antibody-stimulated thymic lymphocytes but not in splenic lymphocytes, using a phosphatidylcholine-specific phospholipase C (PC-PLC) inhibitor which blocked cells in the G(1)/S phase of the cell cycle, This suggests that the H-1-NMR-detectable mobile Lipid may be generated in anti-CD3 antibody-stimulated thymic lymphocytes by the action of PC-PLC activity via the catabolism of PC, in the absence of classical signs of activation. (C) 1997 Academic Press.