57 resultados para signatures


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Certificate-based encryption was introduced in Eurocrypt '03 to solve the certificate management problem in public key encryption. Recently, this idea was extended to certificate-based signatures. Several new schemes and security models of certificate-based signature by comparing it with digital signatures in other popular public key systems. We introduce a new security model of certificate-based signature, which defines several new types of adversaries against certificate-based signature, which defines several new types of adversaries against certificate-based signatures, along with the security model of certificate-based signatures against them. The new model is clearer and more elaborated compared with other existing ones. We then investigate the relationship between certificate-based signatures and certificate-less signatures, and propose a generic construction of certificate-based signatures and certificate less signatures, and propose a generic construction of certificate-based signatures. We prove that the generic construction is secure (in the random oracle model) against all types of adversaries defined in this paper, assuming the underlying certificateless signatures satisfying certain security notions. Based on our generic construction, we are able to construct new certificate-based signatures schemes, which are more effiecient in comparison with other schemes with similar security levels

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Optimistic fair exchange (OFE) protocols are useful tools for two participants to fairly exchange items with the aid of a third party who is only involved if needed. A widely accepted requirement is that the third party's involvement in the exchange must be transparent, to protect privacy and avoid bad publicity. At the same time, a dishonest third party would compromise the fairness of the exchange and the third party thus must be responsible for its behaviors. This is achieved in OFE protocols with another property called accountability. It is unfortunate that the accountability has never been formally studied in OFE since its introduction ten years ago. In this paper, we fill these gaps by giving the first complete definition of accountability in OFE where one of the exchanged items is a digital signature and a generic (also the first) design of OFE where transparency and accountability coexist.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Attribute-based signature (ABS) enables users to sign messages over attributes without revealing any information other than the fact that they have attested to the messages. However, heavy computational cost is required during signing in existing work of ABS, which grows linearly with the size of the predicate formula. As a result, this presents a significant challenge for resource-constrained devices (such as mobile devices or RFID tags) to perform such heavy computations independently. Aiming at tackling the challenge above, we first propose and formalize a new paradigm called Outsourced ABS, i.e., OABS, in which the computational overhead at user side is greatly reduced through outsourcing intensive computations to an untrusted signing-cloud service provider (S-CSP). Furthermore, we apply this novel paradigm to existing ABS schemes to reduce the complexity. As a result, we present two concrete OABS schemes: i) in the first OABS scheme, the number of exponentiations involving in signing is reduced from O(d) to O(1) (nearly three), where d is the upper bound of threshold value defined in the predicate; ii) our second scheme is built on Herranz et al.'s construction with constant-size signatures. The number of exponentiations in signing is reduced from O(d2) to O(d) and the communication overhead is O(1). Security analysis demonstrates that both OABS schemes are secure in terms of the unforgeability and attribute-signer privacy definitions specified in the proposed security model. Finally, to allow for high efficiency and flexibility, we discuss extensions of OABS and show how to achieve accountability as well.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Respiration detection using microwave Doppler radar has attracted significant interest primarily due to its unobtrusive form of measurement. With less preparation in comparison with attaching physical sensors on the body or wearing special clothing, Doppler radar for respiration detection and monitoring is particularly useful for long-term monitoring applications such as sleep studies (i.e. sleep apnoea, SIDS). However, motion artefacts and interference from multiple sources limit the widespread use and the scope of potential applications of this technique. Utilising the recent advances in independent component analysis (ICA) and multiple antenna configuration schemes, this work investigates the feasibility of decomposing respiratory signatures into each subject from the Doppler-based measurements. Experimental results demonstrated that FastICA is capable of separating two distinct respiratory signatures from two subjects adjacent to each other even in the presence of apnoea. In each test scenario, the separated respiratory patterns correlate closely to the reference respiration strap readings. The effectiveness of FastICA in dealing with the mixed Doppler radar respiration signals confirms its applicability in healthcare applications, especially in long-term home-based monitoring as it usually involves at least two people in the same environment (i.e. two people sleeping next to each other). Further, the use of FastICA to separate involuntary movements such as the arm swing from the respiratory signatures of a single subject was explored in a multiple antenna environment. The separated respiratory signal indeed demonstrated a high correlation with the measurements made by a respiratory strap used currently in clinical settings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Women's Human Rights and the Muslim Question shows how Muslim women have made meaningful contributions to the development of the international framework on gender equality and women's rights. An investigation into the women's movement of Iran offers a practical grounding for this argument, and presents unprecedented findings on how ideological divisions along secular and religious lines have been worked in favour of a rights-based framework for change.The book presents a comprehensive synthesis and analysis of the campaign material of the women's movement 'Change for Equality Campaign'—one of the most progressive and sophisticated movements in the Middle East/Central Asia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Analysis of the fatty acid (FA) composition of blubber is a valuable tool in interpreting the diet of marine mammals. This technique is based on the principle that particular FA present in prey can be incorporated largely untransformed into predator adipose tissue stores, thereby providing biochemical signatures with which to identify prey species. Several studies of phocid seals and cetaceans have documented vertical stratification in the FA composition of blubber such that inferences about diet may vary greatly depending on the layer of the blubber that is analysed. It is not known whether blubber in otariid seals (fur seals and sea lions) also displays vertical stratification in FA composition. Furthermore, it is not known whether the FA composition of blubber is uniform in these species. In the present study, the vertical and regional variation in FA composition of blubber was investigated in seven adult female Cape fur seals (Arctocephalus pusillus pusillus). The proportion of monounsaturated fatty acids (MUFA) was greater in the outer (43.6±1.3%) than inner portion (40.9±1.2%; t20=5.59, P<0.001) whereas the proportions were greater in the inner than outer portions for saturated fatty acids (23.6±0.5% and 21.9±0.6%, respectively, t20 = 5.31, P<0.001) and polyunsaturated fatty acids (PUFA, 35.5±0.7% and 34.5±0.7%, respectively, t20 = 3.81, P < 0.001). There was an inverse relationship between MUFA and PUFA in the blubber, independent of sampling location. In addition, with the exception of the inner portion from non-lactating females, blubber from the mammary area had the highest proportions of 18:1ω9c and total MUFA, followed by blubber from the rump and neck, suggesting that the deposition and mobilisation of blubber lipids may not be uniform around the body in otariid seals. These results support the need for blubber tissue to be sampled from the same site on animals, and to the full depth of the blubber layer, to minimise variation in FA profiles that could occur if different sites and depths were sampled. Such standardisation of sampling will further aid in interpreting diet in otariid seals using the FA Signature Analysis approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Natriuretic peptides (NP) were first identified in animals where they play a role in the regulation of salt and water balance. This regulation is partly mediated by intracellular changes in cyclic GMP (cGMP). NP immunoanalogues occur in many plants and have been isolated, with two NP encoding genes characterised in Arabidopsis thaliana L. (AtPNP-A and AtPNP-B). Part of AtPNP-A contains the region with homology to human atrial (A)NP. We report here on the effects of recombinant AtPNP-A and smaller synthetic peptides within the ANP-homologous region with a view to identifying the biologically active domain of the molecule. Furthermore, we investigated interactions between AtPNP-A and the hormone, abscisic acid (ABA). ABA does not significantly affect Arabidopsis mesophyll protoplast volume regulation, whereas AtPNP-A and synthetic peptides promote water uptake into the protoplasts causing swelling. This effect is promoted by the membrane permeable cGMP analogue, 8-Br-cGMP, and inhibited by guanylate cyclase inhibitors indicating that increases in cGMP are an essential component of the plant natriuretic peptides (PNP) signalling cascade. ABA does not induce cGMP transients and does not affect AtPNP-A dependent cGMP increases, hence the two regulators differ in their second messenger signatures. Interestingly, AtPNP-A significantly delays and reduces the extent of ABA stimulated stomatal closure that is also based on cell volume regulation. We conclude that a complex interplay between observed PNP effects (stomatal opening and protoplast swelling) and ABA is likely to be cell type specific.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. Large amounts of terrestrial detritus enter many low-order forested streams, and this organic
material is often the major basal resource in the metazoan food webs of such systems. However,
despite their apparently low biomass, algae are the dominant food of organisms in a number of
aquatic communities which conventionally would have been presumed to be dependent on
allochthonous detritus, particularly those in the tropics and also in lowland intermittent streams
in arid Australia.
2. The dual stable isotope signatures (d13C and d15N) of potential primary food sources were
compared with the isotopic signatures of common aquatic animals in lowland intermittent
streams in south-eastern Australia, in both spring and summer, to determine whether
allochthonous detritus was an important nutritional resource in these systems. The isotopic
signatures of the major potential allochthonous plant food sources (Eucalyptus, Phalaris and
Juncus) overlapped, but were distinct from algae and the dominant macrophytes growing in the
study reaches. The isotopic signatures of biofilm were more spatially and temporally variable
than those of the other basal resources.
3. Despite allochthonous detritus having relatively high C : N ratios compared to other
potential basal resources, results from ISOSOURCE mixing model calculations demonstrated
that this detritus, and the associated biofilm, were the major energy sources assimilated by
macroinvertebrate primary consumers in both spring and summer. The importance of these
energy sources was also reflected in animals higher in the food web, including predatory
macroinvertebrates and fish. These resources were supplemented by autochthonous sources of
higher nutritional value (i.e. filamentous algae and macrophytes, which had relatively low
C : N ratios) when they became more prolific as the streams dried to disconnected pools in
summer.
4. The results highlight the importance of allochthonous detritus (particularly from Eucalyptus)
as a dependable energy source for benthic macroinvertebrates and fish in lowland intermittent
streams of south-eastern Australia. This contrasts with previous stable isotope studies
conducted in lowland intermittent streams in arid Australia, which have reported that the fauna
are primarily dependent on autochthonous algae.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis describes the research undertaken for a degree of Master of Science in a retrospective study of airborne remotely sensed data registered in 1990 and 1993, and field captured data of aquatic humus concentrations for ~ 45 lakes in Tasmania. The aim was to investigate and describe the relationship between the remotely sensed data and the field data and to test the hypothesis that the remotely sensed data would establish further evidence of a limnological corridor of change running north-west to south- east. The airborne remotely sensed data consisted of data captured by the CSIRO Ocean Colour Scanner (OCS) and a newly developed Canadian scanner, a compact airborne spectrographic imager (CASI). The thesis investigates the relationship between the two kinds of data sources. The remotely sensed data was collected with the OCS scanner in 1990 (during one day) and with both the OCS and the CASI in 1993 (during three days). The OCS scanner registers data in 9 wavelength bands between 380 nm and 960 nm with a 10-20 nm bandwidth, and the CASI in 288 wavelength bands between 379.57 nm and 893.5 nm (ie. spectral mode) with a spectral resolution of 2.5 nm. The remotely sensed data were extracted from the original tapes with the help of the CSIRO and supplied software and digital sample areas (band value means) for each lake were subsequently extracted for data manipulation and statistical analysis. Field data was captured concurrently with the remotely sensed data in 1993 by lake hopping using a light aircraft with floats. The field data used for analysis with the remotely sensed data were the laboratory determined g440 values from the 1993 water samples collated with g440 values determined from earlier years. No spectro-radiometric data of the lakes, data of incoming irradiance or ancillary climatic data were captured during the remote sensing missions. The sections of the background chapter in the thesis provide a background to the research both in regards to remote sensing of water quality and the relationship between remotely sensed spectral data and water quality parameters, as well as a description of the Tasmanian lakes flown. The lakes were divided into four groups based on results from previous studies and optical parameters, especially aquatic humus concentrations as measured from field captured data. The four groups consist of the ‘green” clear water lakes mostly situated on the Central Plateau, the ‘brown” highly dystrophic lakes in western Tasmania, the ‘corridor” lakes situated along a corridor of change lying approximately between the two lines denoting the Jurassic edge and 1200 mm isohyet, and the ‘eastern, turbid” lakes make up the fourth group. The analytical part of the research work was mostly concerned with manipulating and analysing the CASI data because of its higher spectral resolution. The research explores methods to apply corrections to this data to reduce the disturbing effects of varying illumination and atmospheric conditions. Three different methods were attempted. In the first method two different standardisation formulas are applied to the data as well as ‘day correction” factors calculated from data from one of the lakes, Lake Rolleston, which had data captured for all three days of the remote sensing operations. The standardisation formulas were also applied to the OCS data. In second method an attempt to reduce the effects of the atmosphere was performed using spectro-radiometric captured in 1988 for one of the lakes flown, Great Lake. All the lake sample data were time normalised using general irradiance data obtained from the University of Tasmania and the sky portion as calculated from Great Lake upwelling irradiance data was then subtracted. The last method involved using two different band ratios to eliminate atmospheric effects. Statistical analysis was applied to the data resulting from the three methods to try to describe the relationship between the remotely sensed data and the field captured data. Discriminant analysis, cluster analysis and factor analysis using principal component analysis (pea) were applied to the remotely sensed data and the field data. The factor scores resulting from the pca were regressed against the field collated data of g440 as were the values resulting from last method. The results from the statistical analysis of the data from the first method show that the lakes group well (100%) against the predetermined groups using discriminant analysis applied to the remotely sensed CASI data. Most variance in the data are contained in the first factor resulting from pca regardless of data manipulation method. Regression of the factor scores against g440 field data show a strong non- linear relationship and a one-sided linear regression test is therefore considered an inappropriate analysis method to describe the dataset relationships. The research has shown that with the available data, correction and analysis methods, and within the scope of the Masters study, it was not possible to establish the relationships between the remotely sensed data and the field measured parameters as hoped. The main reason for this was the failure to retrieve remotely sensed lake signatures adequately corrected for atmospheric noise for comparison with the field data. This in turn is a result of the lack of detailed ancillary information needed to apply available established methods for noise reduction - to apply these methods we require field spectroradiometric measurements and environmental information of the varying conditions both within the study area and within the time frame of capture of the remotely sensed data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identifying applications and classifying network traffic flows according to their source applications are critical for a broad range of network activities. Such a decision can be based on packet header fields, packet payload content, statistical characteristics of traffic and communication patterns of network hosts. However, most present techniques rely on some sort of apriori knowledge, which means they require labor-intensive preprocessing before running and cannot deal with previously unknown applications. In this paper, we propose a traffic classification system based on application signatures, with a novel approach to fully automate the process of deriving signatures from unidentified traffic. The key idea is to integrate statistics-based flow clustering with payload-based signature matching method, so as to eliminate the requirement of pre-labeled training data sets. We evaluate the efficiency of our approach using real-world traffic trace, and the results indicate that signature classifiers built from clustered data and pre-labeled data are able to achieve similar high accuracy better than 99%.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Static detection of polymorphic malware variants plays an important role to improve system security. Control flow has shown to be an effective characteristic that represents polymorphic malware instances. In our research, we propose a similarity search of malware using novel distance metrics of malware signatures. We describe a malware signature by the set of control flow graphs the malware contains. We propose two approaches and use the first to perform pre-filtering. Firstly, we use a distance metric based on the distance between feature vectors. The feature vector is a decomposition of the set of graphs into either fixed size k-sub graphs, or q-gram strings of the high-level source after decompilation. We also propose a more effective but less computationally efficient distance metric based on the minimum matching distance. The minimum matching distance uses the string edit distances between programs' decompiled flow graphs, and the linear sum assignment problem to construct a minimum sum weight matching between two sets of graphs. We implement the distance metrics in a complete malware variant detection system. The evaluation shows that our approach is highly effective in terms of a limited false positive rate and our system detects more malware variants when compared to the detection rates of other algorithms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Traditional methods of object recognition are reliant on shape and so are very difficult to apply in cluttered, wideangle and low-detail views such as surveillance scenes. To address this, a method of indirect object recognition is proposed, where human activity is used to infer both the location and identity of objects. No shape analysis is necessary. The concept is dubbed 'interaction signatures', since the premise is that a human will interact with objects in ways characteristic of the function of that object - for example, a person sits in a chair and drinks from a cup. The human-centred approach means that recognition is possible in low-detail views and is largely invariant to the shape of objects within the same functional class. This paper implements a Bayesian network for classifying region patches with object labels, building upon our previous work in automatically segmenting and recognising a human's interactions with the objects. Experiments show that interaction signatures can successfully find and label objects in low-detail views and are equally effective at recognising test objects that differ markedly in appearance from the training objects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In surveillance systems for monitoring people behaviours, it is important to build systems that can adapt to the signatures of people's tasks and movements in the environment. At the same time, it is important to cope with noisy observations produced by a set of cameras with possibly different characteristics. In previous work, we have implemented a distributed surveillance system designed for complex indoor environments [1]. The system uses the Abstract Hidden Markov mEmory Model (AHMEM) for modelling and specifying complex human behaviours that can take place in the environment. Given a sequence of observations from a set of cameras, the system employs approximate probabilistic inference to compute the likelihood of different possible behaviours in real-time. This paper describes the techniques that can be used to learn the different camera noise models and the human movement models to be used in this system. The system is able to monitor and classify people behaviours as data is being gathered, and we provide classification results showing the system is able to identify behaviours of people from their movement signatures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Binary signatures have been widely used to detect malicious software on the current Internet. However, this approach is unable to achieve the accurate identification of polymorphic malware variants, which can be easily generated by the malware authors using code generation engines. Code generation engines randomly produce varying code sequences but perform the same desired malicious functions. Previous research used flow graph and signature tree to identify polymorphic malware families. The key difficulty of previous research is the generation of precisely defined state machine models from polymorphic variants. This paper proposes a novel approach, using Hierarchical Hidden Markov Model (HHMM), to provide accurate inductive inference of the malware family. This model can capture the features of self-similar and hierarchical structure of polymorphic malware family signature sequences. To demonstrate the effectiveness and efficiency of this approach, we evaluate it with real malware samples. Using more than 15,000 real malware, we find our approach can achieve high true positives, low false positives, and low computational cost.