904 resultados para Identity based encryption


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption

Relevância:

100.00% 100.00%

Publicador:

Resumo:

L'objectiu principal del projecte és l'estudi, la implementació d'algoritmes i protocols amb criptografia basada en la identitat. Aquesta o Identity Based Encryption (IBE) s'utilitza per simplificar el procés de comunicacions segures, com per exemple el correu electrònic. IBE permet a les polítiques de seguretat ser codificades directament sense la necessitat d'usar certificats. Aquests esquemes van ser proposats inicialment per A. Shamir a l'any 1984 i han estat objecte d'estudi per D. Boneh, S. Galbraith, etc. En aquest farem l'estudi dels emparellaments de Werl i Tate a través de l'algorisme de Miller, que ens permetrà implementar aquests emparellaments sobre corbes el·líptiques supersingulars.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The main objective of this paper is to evaluate the key elements in the construction of cosistent organisational messages over time. In order to accomplish that, we propose the aligment of several elements: vision, misson, objectives, cultural values, optimal identity attributes, positioning, type of messages, communication style and means, and image...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We analyze the consistency of the recently proposed regularization of an identity based solution in open bosonic string field theory. We show that the equation of motion is satisfied when it is contracted with the regularized solution itself. Additionally, we propose a similar regularization of an identity based solution in the modified cubic superstring field theory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this study was to explore two of the mechanisms by which transformational leaders have a positive influence on followers. It examined the mediating role of follower's leader and group identification on the associations among different transformational leader behaviours and follower job satisfaction and supervisor-rated job performance. One hundred and seventy-nine healthcare employees and 44 supervisors participated in the study. The results from multilevel structural equation modelling provided results that partially supported the predicted model. Identification with the leader significantly mediated the positive associations between supportive leadership, intellectual stimulation, personal recognition, in the prediction of job satisfaction and job performance. Leader identification also mediated the relationship between supportive leadership, intellectual stimulation, personal recognition, and group identification. However, group identification did not mediate the associations between vision leadership and inspirational communication, in the prediction of job satisfaction and job performance. The results highlight the role of individualized forms of leadership and leader identification in enhancing follower outcomes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Perceived discrimination is associated with increased engagement in unhealthy behaviors. We propose an identity-based pathway to explain this link. Drawing on an identity-based motivation model of health behaviors (Oyserman, Fryberg, & Yoder, 2007), we propose that erceptions of discrimination lead individuals to engage in ingroup-prototypical behaviors in the service of validating their identity and creating a sense of ingroup belonging. To the extent that people perceive unhealthy behaviors as ingroup-prototypical, perceived discrimination may thus increase motivation to engage in unhealthy behaviors. We describe our theoretical model and two studies that demonstrate initial support for some paths in this model. In Study 1, African American participants who reflected on racial discrimination were more likely to endorse unhealthy ingroup-prototypical behavior as self-characteristic than those who reflected on a neutral event. In Study 2, among African American participants who perceived unhealthy behaviors to be ingroup-prototypical, discrimination predicted greater endorsement of unhealthy behaviors as self-characteristic as compared to a control condition. These effects held both with and without controlling for body mass index (BMI) and income. Broader implications of this model for how discrimination adversely affects health-related decisions are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Bilinear pairings can be used to construct cryptographic systems with very desirable properties. A pairing performs a mapping on members of groups on elliptic and genus 2 hyperelliptic curves to an extension of the finite field on which the curves are defined. The finite fields must, however, be large to ensure adequate security. The complicated group structure of the curves and the expensive field operations result in time consuming computations that are an impediment to the practicality of pairing-based systems. The Tate pairing can be computed efficiently using the ɳT method. Hardware architectures can be used to accelerate the required operations by exploiting the parallelism inherent to the algorithmic and finite field calculations. The Tate pairing can be performed on elliptic curves of characteristic 2 and 3 and on genus 2 hyperelliptic curves of characteristic 2. Curve selection is dependent on several factors including desired computational speed, the area constraints of the target device and the required security level. In this thesis, custom hardware processors for the acceleration of the Tate pairing are presented and implemented on an FPGA. The underlying hardware architectures are designed with care to exploit available parallelism while ensuring resource efficiency. The characteristic 2 elliptic curve processor contains novel units that return a pairing result in a very low number of clock cycles. Despite the more complicated computational algorithm, the speed of the genus 2 processor is comparable. Pairing computation on each of these curves can be appealing in applications with various attributes. A flexible processor that can perform pairing computation on elliptic curves of characteristic 2 and 3 has also been designed. An integrated hardware/software design and verification environment has been developed. This system automates the procedures required for robust processor creation and enables the rapid provision of solutions for a wide range of cryptographic applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Bildbasierte Authentifizierung und Verschlüsselung: Identitätsbasierte Kryptographie (oft auch identity Based Encryption, IBE) ist eine Variation der asymmetrischen Schlüsselverfahren, bei der der öffentliche Schlüssel des Anwenders eine beliebig wählbare Zeichenfolge sein darf, die dem Besitzer offensichtlich zugeordnet werden kann. Adi Shamir stellte 1984 zunächst ein solches Signatursystem vor. In der Literatur wird dabei als öffentlicher Schlüssel meist die Email-Adresse oder eine Sozialversicherungsnummer genannt. Der Preis für die freie Schlüsselwahl ist die Einbeziehung eines vertrauenswürdigen Dritten, genannt Private Key Generator, der mit seinem privaten Generalschlüssel den privaten Schlüssel des Antragstellers generiert. Mit der Arbeit von Boneh und Franklin 2001 zum Einsatz der Weil-Paarbildung über elliptischen Kurven wurde IBE auf eine sichere und praktikable Grundlage gestellt. In dieser Arbeit wird nach einer allgemeinen Übersicht über Probleme und Lösungsmöglichkeiten für Authentifizierungsaufgaben im zweiten Teil als neue Idee der Einsatz eines Bildes des Anwenders als öffentlicher Schlüssel vorgeschlagen. Dazu wird der Ablauf der Schlüsselausgabe, die Bestellung einer Dienstleistung, z. B. die Ausstellung einer personengebundenen Fahrkarte, sowie deren Kontrolle dargestellt. Letztere kann offline auf dem Gerät des Kontrolleurs erfolgen, wobei Ticket und Bild auf dem Handy des Kunden bereitliegen. Insgesamt eröffnet sich dadurch die Möglichkeit einer Authentifizierung ohne weitere Preisgabe einer Identität, wenn man davon ausgeht, dass das Bild einer Person angesichts allgegenwärtiger Kameras sowieso öffentlich ist. Die Praktikabilität wird mit einer Implementierung auf der Basis des IBE-JCA Providers der National University of Ireland in Maynooth demonstriert und liefert auch Aufschluss auf das in der Praxis zu erwartende Laufzeitverhalten.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La Criptografía Basada en la Identidad hace uso de curvas elípticas que satisfacen ciertas condiciones (pairingfriendly curves), en particular, el grado de inmersión de dichas curvas debe ser pequeño. En este trabajo se obtienen familias explicitas de curvas elípticas idóneas para este escenario. Dicha criptografía está basada en el cálculo de emparejamientos sobre curvas, cálculo factible gracias al algoritmo de Miller. Proponemos una versión más eficiente que la clásica de este algoritmo usando la representación de un número en forma no adyacente (NAF).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

There is a wide agreement that identity is a multidisciplinary concept. The authors consider this an opportunity do develop a framework to assess identity. In a marketing context, literature reveals two approaches on identity: one focus on corporate identity and the other focus on branding. The aim of this paper is to integrate these two approaches to develop a synthesis framework to assess brand identity. Based on literature on identity the authors found nine components related to brand identity. Those components are described in this paper as well as the relation they have with brand identity. The authors hope that this synthesis approach contributes to a better understanding of the brand identity, and are very encouraging for refining this framework in the future.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

L’objectif général de ce mémoire est de comprendre l‘impact du genre sur l’identité de travail des cowboys, dans leur milieu de travail et de vie dans un ranch du Canada. Cette étude vise à contribuer aux études sur le genre en utilisant des théories existantes pour les appliquer à un nouveau champ. Sur la base d’une approche théorique fondée dans le féminisme et les études sur la masculinité, en utilisant aussi l’histoire des cowboys de l’Ouest, cette étude se penche sur la question de l’importance du genre dans la division du travail dans le ranch, celle de l’identité de travail des cowboys et sur la façon dont le genre affecte cette identité. La collecte des données s’est faite par l’observation participante et des entrevues semi-structurées. En utilisant une analyse thématique des données, l’étude conclut que le genre est un principe important dans la division du travail dans le ranch et que l’identité de travail est d’une extrême importance pour les cowboys. En outre, l’étude démontre que le genre jour de différentes façons dans l’identité de travail, l’hétéronormativité et les idéaux du cowboy allant dans le même sens, alors que la féminité s’oppose à cet idéal. Les traditions sont encore importantes pour les cowboys contemporains, mais en même temps, ceux-ci mentionnent la réalité du travail éreintant et sans fin comme contrepoids à l’image romantique de la vie des cowboys. Enfin, il y a des similitudes entre les cowboys de cette étude et les adolescentes suédoises étudies par Ambjörnsonn (2004) dans la façon dont le groupe se crée une identité sur la base du genre.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Recent demographic changes have made settlement patterns in the Canadian Arctic increasingly urban. Iqaluit, capital of Canada’s newest territory, Nunavut, is home to the largest concentration of Inuit and non-Inuit populations in the Canadian North. Despite these trends, Inuit cultural identity continues to rest heavily on the perception that to learn how to be authentically Inuit (or to be a better person), a person needs to spend time out on the land (and sea) hunting, fishing, trapping, and camping. Many Inuit also maintain a rather negative view of urban spaces in the Arctic, identifying them as places where Inuit values and practices have been eclipsed by Qallunaat (‘‘white people’’) ones. Some Inuit have even gone so far as to claim that a person is no longer able to be Inuit while living in towns like Iqaluit. This article examines those aspects of Canadian Inuit identity, culture, and tradition that disfavor the acceptance of an urban cultural identity. Based on ethnographic research conducted on Baffin Island in the mid 1990s and early 2000s, the many ways Iqaluit and outpost camp Inuit express the differences and similarities between living on the land and living in town are described. Then follows an examination of how the contrast of land and town is used in the rhetoric of Inuit politicians and leaders. Finally, a series of counterexamples are presented that favor the creation of an authentic urban Inuit identity in the Arctic, including recent attempts on the part of the Nunavut Territorial Government to make education and wage employment in the region more reliant on Inuit Qaujimajatuqangit, or Inuit traditional knowledge.1

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Gay and lesbian prides and marches are of crucial relevance to the way in which non-heterosexual lives are imagined internationally despite regional and national differences. Quite often, these events are connected not only with increased activist mobilisation, but also with great controversy, which is the case of Poland, where gay and lesbian marches have been attacked by right-wing protesters and cancelled by right-wing city authorities on a number of occasions. Overall, the scholars analysing these events have largely focused on the macro-context of the marches, paying less attention to the movement actors behind these events. The contribution of this thesis lies not only in filling a gap when it comes to research on sexual minorities in Eastern Europe/Poland, but also in its focus on micro-level movement processes and engagement with theories of collective identity and citizenship. Furthermore, this thesis challenges the inscription of Eastern European/Polish movements into the narrative of victimhood and delayed development when compared to LGBT movements in the Global North. This thesis is grounded in qualitative research including participant observation of public activist events as well as forty semi-structured interviews with the key organisers of gay and lesbian marches in Warsaw, Poznan and Krakow between 2001 and 2007, and five of these interviews were further accompanied by photo-elicitation (self-directed photography) methods. Starting from the processes whereby from 2001 onwards, marches, pride parades and demonstrations became the most visible and contested activity of the Polish lesbian and gay movement, this thesis examines how the activists redefined the meanings of citizenship in the post-transformation context, by incorporating the theme of sexual minorities' rights. Using Bernstein's (1997, 2002, 2005, 2008) concept of identity deployment, I show how and when movement actors use identity tactically, depending on their goals. Specifically, in the context of movement-media interactions, I examine the ways in which the activists use marches to challenge the negative representations of sexual minorities in Poland. I also broaden Bernstein's framework to include the discussion of emotion work as relevant to public LGBT activism in Poland. Later, I discuss how the emotions of protests allowed the activists to inscribe their efforts into the "revolutionary" narrative of the Polish Solidarity movement and by extension, the frame of citizenship. Finally, this thesis engages with the dilemmas of identity deployment strategies, and seeks to problematise the dichotomy between identity-based gay and lesbian assimilationist strategies and the anti-identity queer politics.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The purpose of this study was to gain an understanding and gather insight into the experiences of Cuban American women attending a 4-year, public, Hispanic Serving Institution and how those experiences influenced their identity development. This was accomplished by conducting in-depth interviews and focus groups with 12 self-identified Cuban American women who were classified as sophomores, juniors, seniors, or graduate students. All of the participants had attended Florida International University for at least 1 year. The women had varying degrees of on and off campus academic and campus involvement activities. Participants were asked about six topics: (a) family, (b) cultural influences, (c) gender, (d) ethical and moral development, (e) education, and (f) ethnic identity. Based on the coding of the data provided by the participants, several interconnected themes emerged including the importance of family, familial support, cultural pride, expected gender roles, core values, decision making, biculturalism, and the value of attending a Hispanic Serving Institution. These themes were found to be all related to the identity development of the participants. It was found that looking at identity through a multidimensional lens is essential. Looking at personal growth and development through anthropological, sociological, and psychosocial lenses gave greater insight to a population of students who have been largely underrepresented in the literature. The findings of this case study are that culture is contextual and identity development is complex for first and second generation Cuban American women attending a Hispanic Serving Institution in a majority minority city. It was found that several factors, including the importance of family and gender roles, were not found to be more important than one another; rather they supported each other in regards to the participants' identity development. The notion of biculturalism as it has been presented in the literature was challenged in this study as it was found that the participants' experiences living and attending a school in a majority minority city presented a new way of understanding what it might mean to be bicultural. For professionals in the field, the findings of this study may lead to a broader understanding of nuances within the Hispanic community and a better understanding of the distinctiveness of what it means to be a Cuban American woman.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Collaborative sharing of information is becoming much more needed technique to achieve complex goals in today's fast-paced tech-dominant world. Personal Health Record (PHR) system has become a popular research area for sharing patients informa- tion very quickly among health professionals. PHR systems store and process sensitive information, which should have proper security mechanisms to protect patients' private data. Thus, access control mechanisms of the PHR should be well-defined. Secondly, PHRs should be stored in encrypted form. Cryptographic schemes offering a more suitable solution for enforcing access policies based on user attributes are needed for this purpose. Attribute-based encryption can resolve these problems, we propose a patient-centric framework that protects PHRs against untrusted service providers and malicious users. In this framework, we have used Ciphertext Policy Attribute Based Encryption scheme as an efficient cryptographic technique, enhancing security and privacy of the system, as well as enabling access revocation. Patients can encrypt their PHRs and store them on untrusted storage servers. They also maintain full control over access to their PHR data by assigning attribute-based access control to selected data users, and revoking unauthorized users instantly. In order to evaluate our system, we implemented CP-ABE library and web services as part of our framework. We also developed an android application based on the framework that allows users to register into the system, encrypt their PHR data and upload to the server, and at the same time authorized users can download PHR data and decrypt it. Finally, we present experimental results and performance analysis. It shows that the deployment of the proposed system would be practical and can be applied into practice.