12 resultados para Cryptographic Protocols, Provable Security, ID-Based Cryptography

em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this work we evaluated the photophysical and in vitro properties of Foscan (R), a second-generation photosensitizer drug (PS) widely used in systemic clinical protocols for cancer therapy based on Photodynamic Therapy (PDT). We employed biodegradable nanoemulsions (NE) as a colloidal vehicle of the oil/water (o/w) type focusing in topical administration of Foscan (R) and other photosensitizer drugs. This formulation was obtained and stabilized by the methodology described by Tabosa do Egito et al.,(30) based on the mixture of two phases: an aqueous solution and an organic medium consisting of nonionic surfactants and oil. The photodynamic potential of the drug incorporated into the NE was studied by steady-state and time-resolved spectroscopic techniques. We also analyzed the in vitro biological behavior carried out in mimetic biological environment protocols based on the animal model. After topical application in a skin animal model, we evaluated the Foscan (R)/NE diffusion flux into the skin layers (stratum corneum and epidermis + dermis) by classical procedures using Franz Diffusion cells. Our results showed that the photophysical properties of PS were maintained after its incorporation into the NE when compared with homogeneous organic medium. The in vitro assays enabled the determination of an adequate profile for the interaction of this system in the different skin layers, with an ideal time lag of 6 h after topical administration in the skin model. The Foscan (R) diffusion flux (J) was increased when this PS was incorporated into the NE, if compared with its flux in physiological medium. These parameters demonstrated that the NE can be potentially applied as a drug delivery system (DDS) for Foscan (R) in both in vitro and in vivo assays, as well as in future clinical applications involving topical skin cancer PDT.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: In the literature there is no validated instrument for the clinical evaluation of the orofacial myofunctional condition of children that will permit the examiner to express numerically his perception of the characteristics and behaviors observed. The proposal of this study is to describe a protocol for the evaluation of children aged 6-12 years in order to establish relations between the orofacial. myofunctional conditions and numerical scales. The protocol validity, reliability of the examiners and agreement between them was analyzed. Methods: Eighty children aged 6-12 years participated in the study. All were evaluated and 30 were selected at random for the analyses (age range: 72-149 months, mean = 103.3, S.D. = 23.57). Individuals with and without orofacial myofunctional. disorders were included. The examiners were two speech therapists property calibrated in orofacial myofunctional evaluation. Two protocols were constructed. One, based on traditional models, was called traditional orofacial. myofunctional. evaluation (TOME), and the other, with the addition of numerical scales, was called orofacial myofunctional. evaluation with scores (OMES). The clinical conditions included were: appearance, posture and mobility of lips, tongue, cheeks and jaws, respiration, mastication and deglutition. Statistical analysis was performed using the split-half reliability method. Means, standard deviations and the Spearman correlation coefficient were also calculated. Results: There was a statistically significant correlation between the evaluations of 30 children assessed with the TOME and OMES protocols (r = 0.85, p < 0.01). The reliability between protocols was 0.92. The test-retest reliability of the OMES instrument was 0.99 and the correlation was 0.98. Reliability between examiners 1 and 2 using the OMES protocol was 0.99, and the correlation was 0.98 (P < 0.01). Conclusion: The OMES protocot proved to be a valid and reliable instrument for orofacial myofunctional evaluation, permitting the grading of orofacial myofunctional conditions within the limits of the selected items. (c) 2007 Elsevier Ireland Ltd. All rights reserved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be implemented efficiently in software and give first performance numbers. A detailed analysis of the security against state-of-the-art cryptanalysis methods is also provided. In comparison to the algorithms submitted to the SHA-3 competition, Whirlwind takes recent developments in cryptanalysis into account by design. Even though software performance is not outstanding, it compares favourably with the 512-bit versions of SHA-3 candidates such as LANE or the original CubeHash proposal and is about on par with ECHO and MD6.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

For the last decade, elliptic curve cryptography has gained increasing interest in industry and in the academic community. This is especially due to the high level of security it provides with relatively small keys and to its ability to create very efficient and multifunctional cryptographic schemes by means of bilinear pairings. Pairings require pairing-friendly elliptic curves and among the possible choices, Barreto-Naehrig (BN) curves arguably constitute one of the most versatile families. In this paper, we further expand the potential of the BN curve family. We describe BN curves that are not only computationally very simple to generate, but also specially suitable for efficient implementation on a very broad range of scenarios. We also present implementation results of the optimal ate pairing using such a curve defined over a 254-bit prime field. (C) 2001 Elsevier Inc. All rights reserved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The objective of this study was to evaluate the effects of treatment with an intravaginal progesterone-releasing device (CIDR) and estradiol benzoate (EB) on follicular dynamics in Bos indicus (n = 23), Bos taurus (n = 25), and cross-bred (n = 23) heifers. To assess the influence of reduced serum progesterone concentrations during 8 days of treatment with a progesterone-releasing device on follicular dynamics, half of the heifers received PGF at CIDR insertion (Day 0; 3 x 2 factorial design). Mean ( +/- S.E.M.) serum progesterone concentrations during CIDR treatment varied (P < 0.05) among genetic groups: B. indicus (5.4 +/- 0.1 ng/mL), B. taurus (3.3 +/- 0.0 ng/mL), and cross-bred (4.3 +/- 0.1 ng/mL). Maximum diameter of the dominant follicle (DF) was smaller (P < 0.01) in B. indicus heifers (9.5 +/- 0.5 mm) than in cross-bred (12.3 +/- 0.4 mm) or B. taurus heifers (11.6 +/- 0.5 mm). B. indicus experienced lower (P < 0.01) ovulation rate (39.1%) than did B. taurus (72.7%) and cross-bred (84.0%). Heifers treated with PGF on Day 0 had lower (P < 0.05) serum progesterone concentrations during progesterone treatment. The PGF treatment on Day 0 increased (P < 0.01) the diameter of the DF (11.9 +/- 0.4 mm vs. 10.5 +/- 0.4 mm). Moreover, greater (P = 0.02) ovulation rates (78.8 vs. 54.0%) occurred in heifers treated with PGF on Day 0. In summary, B. indicus heifers had greater serum progesterone concentrations, smaller DF diameter, and a lower ovulation rate compared to B. taurus heifers. Prostaglandin treatment on the day of CIDR insertion reduced serum progesterone during treatment, and resulted in increased maximum DF diameter and ovulation rate. (c) 2008 Elsevier Inc. All rights reserved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of the present study was to improve the detection of B. abortus by PCR in organs of aborted fetuses from infected cows, an important mechanism to find infected herds on the eradication phase of the program. So, different DNA extraction protocols were compared, focusing the PCR detection of B. abortus in clinical samples collected from aborted fetuses or calves born from cows challenged with the 2308 B. abortus strain. Therefore, two gold standard groups were built based on classical bacteriology, formed from: 32 lungs (17 positives), 26 spleens (11 positives), 23 livers (8 positives) and 22 bronchial lymph nodes (7 positives). All samples were submitted to three DNA extraction protocols, followed by the same amplification process with the primers B4 and B5. From the accumulated results for organ, the proportion of positives for the lungs was higher than the livers (p=0.04) or bronchial lymph nodes (p=0.004) and equal to the spleens (p=0.18). From the accumulated results for DNA extraction protocol, the proportion of positives for the Boom protocol was bigger than the PK (p<0.0001) and GT (p=0.0004). There was no difference between the PK and GT protocols (p=0.5). Some positive samples from the classical bacteriology were negative to the PCR and viceversa. Therefore, the best strategy for B. abortus detection in the organs of aborted fetuses or calves born from infected cows is the use, in parallel, of isolation by classical bacteriology and the PCR, with the DNA extraction performed by the Boom protocol.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Few articles deal with lead and strontium isotopic analysis of water samples. The aim of this study was to define the chemical procedures for Pb and Sr isotopic analyses of groundwater samples from an urban sedimentary aquifer. Thirty lead and fourteen strontium isotopic analyses were performed to test different analytical procedures. Pb and Sr isotopic ratios as well as Sr concentration did not vary using different chemical procedures. However, the Pb concentrations were very dependent on the different procedures. Therefore, the choice of the best analytical procedure was based on the Pb results, which indicated a higher reproducibility from samples that had been filtered and acidified before the evaporation, had their residues totally dissolved, and were purified by ion chromatography using the Biorad® column. Our results showed no changes in Pb ratios with the storage time.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objectives: Many morphometric magnetic resonance imaging (MRI) studies that have investigated the presence of gray matter (GM) volume abnormalities associated with the diagnosis of bipolar disorder (BD) have reported conflicting findings. None of these studies has compared patients with recent-onset psychotic BD with asymptomatic controls selected from exactly the same environment using epidemiological methods, or has directly contrasted BD patients against subjects with first-onset psychotic major depressive disorder (MDD). We examined structural brain differences between (i) BD (type I) subjects and MDD subjects with psychotic features in their first contact with the healthcare system in Brazil, and (ii) these two mood disorder groups relative to a sample of geographically matched asymptomatic controls. Methods: A total of 26 BD subjects, 20 subjects with MDD, and 94 healthy controls were examined using either of two identical MRI scanners and acquisition protocols. Diagnoses were based on DSM-IV criteria and confirmed one year after brain scanning. Image processing was conducted using voxel-based morphometry. Results: The BD group showed increased volume of the right dorsal anterior cingulate cortex relative to controls, while the MDD subjects exhibited bilateral foci GM deficits in the dorsolateral prefrontal cortex (p < 0.05, corrected for multiple comparisons). Direct comparison between BD and MDD patients showed a focus of GM reduction in the right-sided dorsolateral prefrontal cortex (p < 0.05, corrected for multiple comparisons) and a trend (p < 0.10, corrected) toward left-sided GM deficits in the dorsolateral prefrontal cortex of MDD patients. When analyses were repeated with scanner site as a confounding covariate the finding of increased right anterior cingulate volumes in BD patients relative to controls remained statistically significant (p = 0.01, corrected for multiple comparisons). Conclusions: These findings reinforce the view that there are important pathophysiological distinctions between BD and MDD, and indicate that subtle dorsal anterior cingulate abnormalities may be relevant to the pathophysiology of BD.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

PURPOSE: To propose an analytic framework for ocular fundus alterations in late-stage Vogt,Koyanagi-Harada (VKH) disease, to describe the characteristics of overall retinal function as measured with full field electroretinography (ERG), and to correlate the intensity of the fundus changes with full-field ERG alterations and to stratify patients accordingly. DESIGN: Cross-sectional case series. METHODS: Forty-seven eyes of 26 patients with late, stage VKH disease (> 6 months past disease onset) followed-up at the University of Sao Paulo School of Medicine underwent fundus photography within 2 months of a full,field ERG examination, both according to pre-defined protocols. Fundus pictures were evaluated by two observers regarding diffuse fundus depigmentation, nummular lesions, pigment clumps, and subretinal fibrosis, and an overall analysis classified the fundus changes as mild, moderate, or severe. Full field ERG results were analyzed according to fundus-based stratification and also were stratified into 3 groups solely on the basis of decreasing amplitudes (ERG based or cluster stratification). The concordance between fundus-based and full-field ERG-based stratification strategies was estimated. RESULTS: Overall fundus grading showed substantial interobserver concordance (kappa = 0.78). Comparison of full field ERG parameters of the three fundus based stratified groups showed diffusely diminished amplitudes with preservation of implicit times (P < .05). Fundus-based and full-field ERG-based stratification strategies also showed substantial concordance (kappa = 0.68). CONCLUSIONS: The analytic framework for fundus findings proposed in this study seems reproducible and useful, because the severity categories do correlate with retinal function as measured by full-field ERG. This system may allow more precise exchange of information between practitioners as well as researchers with regard to identifying patients with greater retinal compromise rapidly as well as in comparison of outcomes of different treatment regimens. (Am J Ophthalmol 2009;148: 939-945. (C) 2009 by Elsevier Inc. All rights reserved.)