798 resultados para cryptographic protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The human right to water has recently been recognised by both the United Nations General Assembly and the Human Rights Council. As the mining industry interacts with water on multiple levels, it is important that these interactions respect the human right to water. Currently, a disconnect exists between mine site water management practices and the recognition of water from a human rights perspective. The Minerals Council of Australia (MCA) Water Accounting Framework (WAF) has previously been used to strengthen the connection between water management and human rights. This article extends this connection through the use of a Social Water Assessment Protocol (SWAP). The SWAP is scoping tool consisting of a set of questions classified into taxonomic themes under leading topics with suggested sources of data that enable mine sites to better understand the local water context in which they operate. Three of the themes contained in the SWAP – gender, Indigenous peoples and health – are discussed to demonstrate how the protocol may be useful in assisting mining companies to consider their impacts on the human right to water.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review question/objective The objective of this review is to identify the effectiveness of surveillance systems and community-based interventions in identifying and responding to emerging and re-emerging zoonotic infections in Southeast Asia (SE Asia). More specifically the research questions are: 1. What is the effectiveness of community-based surveillance interventions designed to identify emerging zoonotic infectious diseases? 2. What is the effectiveness of non-pharmaceutical community-based interventions designed to prevent transmission of emerging zoonotic infectious diseases? 3. How do factors related to the emergence and management of emerging zoonotic infectious diseases impact the effectiveness of interventions designed to identify and respond to them?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

• Premise of the study: Here we propose a staining protocol using TBO and Ruthenium red in order to reliably identify secondary compounds in the leaves of some species of Myrtaceae. • Methods and results: Leaves of 10 species representing 10 different genera of Myrtaceae were processed and stained using five different combinations of Ruthenium red and TBO. Optimal staining conditions were determined as 1 min of Ruthenium red (0.05% aqueous) and 45 sec of TBO (0.1% aqueous). Secondary compounds clearly identified under this treatment include mucilage in mesophyll, polyphenols in cuticle, lignin in fibers and xylem, tannins and carboxylated polysaccharides in epidermis and pectic substances in primary cell walls. • Conclusions: Potential applications of this protocol include systematic, phytochemical and ecological investigations in Myrtaceae. It might be applicable to other plant families rich in secondary compounds and could be used as preliminary screening method for extraction of these elements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Exercise and adequate self-management capacity may be important strategies in the management of venous leg ulcers. However, it remains unclear if exercise improves the healing rates of venous leg ulcers and if a self-management exercise program based on self-efficacy theory is well adhered to. Method/Design: This is a randomised controlled in adults with venous leg ulcers to determine the effectiveness of a self-efficacy based exercise intervention. Participants with venous leg ulcers are recruited from 3 clinical sites in Australia. After collection of baseline data, participants are randomised to either an intervention group or control group. The control group receive usual care, as recommended by evidence based guidelines. The intervention group receive an individualised program of calf muscle exercises and walking. The twelve week exercise program integrates multiple elements, including up to six telephone delivered behavioural coaching and goal setting sessions, supported by written materials, a pedometer and two follow-up booster calls if required. Participants are encouraged to seek social support among their friends, self-monitor their weekly steps and lower limb exercises. The control group are supported by a generic information sheet that the intervention group also receive encouraging lower limb exercises, a pedometer for self-management and phone calls at the same time points as the intervention group. The primary outcome is the healing rates of venous leg ulcers which are assessed at fortnightly clinic appointments. Secondary outcomes, assessed at baseline and 12 weeks: functional ability (range of ankle motion and Tinetti gait and balance score), quality of life and self-management scores. Discussion: This study seeks to address a significant gap in current wound management practice by providing evidence for the effectiveness of a home-based exercise program for adults with venous leg ulcers. Theory-driven, evidence-based strategies that can improve an individual’s exercise self-efficacy and self-management capacity could have a significant impact in improving the management of people with venous leg ulcers. Information gained from this study will provide much needed information on management of this chronic disease to promote health and independence in this population. Trial registration: Australian New Zealand Clinical Trials Registry ACTRN12612000475842 Trial status: Current follow up

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: The prevalence of type 2 diabetes is rising with the majority of patients practicing inadequate disease self-management. Depression, anxiety, and diabetes-specific distress present motivational challenges to adequate self-care. Health systems globally struggle to deliver routine services that are accessible to the entire population, in particular in rural areas. Web-based diabetes self-management interventions can provide frequent, accessible support regardless of time and location Objective: This paper describes the protocol of an Australian national randomized controlled trial (RCT) of the OnTrack Diabetes program, an automated, interactive, self-guided Web program aimed to improve glycemic control, diabetes self-care, and dysphoria symptoms in type 2 diabetes patients. Methods: A small pilot trial is conducted that primarily tests program functionality, efficacy, and user acceptability and satisfaction. This is followed by the main RCT, which compares 3 treatments: (1) delayed program access: usual diabetes care for 3 months postbaseline followed by access to the full OnTrack Diabetes program; (2) immediate program: full access to the self-guided program from baseline onward; and (3) immediate program plus therapist support via Functional Imagery Training (FIT). Measures are administered at baseline and at 3, 6, and 12 months postbaseline. Primary outcomes are diabetes self-care behaviors (physical activity participation, diet, medication adherence, and blood glucose monitoring), glycated hemoglobin A1c (HbA1c) level, and diabetes-specific distress. Secondary outcomes are depression, anxiety, self-efficacy and adherence, and quality of life. Exposure data in terms of program uptake, use, time on each page, and program completion, as well as implementation feasibility will be conducted. Results: This trial is currently underway with funding support from the Wesley Research Institute in Brisbane, Australia. Conclusions: This is the first known trial of an automated, self-guided, Web-based support program that uses a holistic approach in targeting both type 2 diabetes self-management and dysphoria. Findings will inform the feasibility of implementing such a program on an ongoing basis, including in rural and regional locations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review question/objective The objective of this review is to find, critically appraise and synthesize the available quantitative evidence on the effectiveness of interventions that promote successful teaching of the evidence-based practice process in undergraduate health students, in preparation for them to become professional evidence-based practitioners. More specifically, the question that this review seeks to answer is: What is the effectiveness of teaching strategies for evidence-based practice for undergraduate health students? Inclusion criteria Types of participants This review will consider studies that include undergraduate health students from any undergraduate health discipline, including but not limited to medicine, nursing and allied health. Post graduate and post-registration students will not be included. Types of interventions This review will consider studies that evaluate strategies or interventions aimed at teaching any or all of the five steps of evidence-based practice, namely asking a structured clinical question; collecting the best evidence available; critically appraising the evidence to ensure validity, relevance and applicability; applying or integrating the results into clinical practice, and evaluating outcomes. The strategy may take place solely within a tertiary education environment or may be combined with a clinical setting. Types of outcomes This review will consider studies that include the following outcome measures: evidence-based practice behavior, knowledge, skills, attitudes, self-efficacy (or self-confidence), beliefs, values, intention to use evidence-based practice (future use) and confidence levels. Tools used to measure these outcomes will be assessed for reported validity, reliability and generalizability. Outcomes will be measured during the student’s education period up to graduation. If studies are conducted across different year levels this will be taken into account during analysis and reported accordingly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows: To evaluate the efficacy of inhaled corticosteroids in reducing the severity of cough in children with sub-acute cough (defined as cough duration of two to four weeks).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the past few years, research works on the topic of secure outsourcing of cryptographic computations has drawn significant attention from academics in security and cryptology disciplines as well as information security practitioners. One main reason for this interest is their application for resource constrained devices such as RFID tags. While there has been significant progress in this domain since Hohenberger and Lysyanskaya have provided formal security notions for secure computation delegation, there are some interesting challenges that need to be solved that can be useful towards a wider deployment of cryptographic protocols that enable secure outsourcing of cryptographic computations. This position paper brings out these challenging problems with RFID technology as the use case together with our ideas, where applicable, that can provide a direction towards solving the problems.