889 resultados para Message Authentication Code


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the issue of face, speaker and bi-modal authentication in mobile environments when there is significant condition mismatch. We introduce this mismatch by enrolling client models on high quality biometric samples obtained on a laptop computer and authenticating them on lower quality biometric samples acquired with a mobile phone. To perform these experiments we develop three novel authentication protocols for the large publicly available MOBIO database. We evaluate state-of-the-art face, speaker and bi-modal authentication techniques and show that inter-session variability modelling using Gaussian mixture models provides a consistently robust system for face, speaker and bi-modal authentication. It is also shown that multi-algorithm fusion provides a consistent performance improvement for face, speaker and bi-modal authentication. Using this bi-modal multi-algorithm system we derive a state-of-the-art authentication system that obtains a half total error rate of 6.3% and 1.9% for Female and Male trials, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Estimating the prevalence of drink driving is a difficult task. Self‐reported drink driving indicates that drink driving is far more common than official statistics suggest. In order to promote a responsible attitude towards alcohol consumption and drink driving within the Queensland community, the Queensland Police Service, Queensland Health and Queensland Transport developed the ‘Drink Rite’ program (Queensland Police Service information sheet, 2009). However, the feasibility of the program is now in doubt as the National Health and Medical Research Council’s guidelines for alcohol consumption changed in 2009 to state “For healthy men and women, drinking no more than four standard drinks on a single occasion reduces the risk of alcohol‐related injury arising from that occasion” (NHMRC Publication, 2009, p. 51). As such, adhering to the NHMRC guidelines places restrictions on how the existing Drink Rite program can be operated (i.e. by reducing the number of standard drinks provided to participants from eight to four). It is arguable that a reduction in the number of alcoholic drinks provided to participants in the program will result in a large reduction in observed BAC readings. This, in turn, will lead to a potential loss of message content when discussing the variation in the effects of alcohol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Project overview, promotional poster and how to access and use the checklist (student guide)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Study/Objective This research examines the types of emergency messages used in Australia during the response and early recovery phases of a natural disaster. The aim of the research is to develop theory-driven emergency messages that increase individual behavioural compliance during a disaster. Background There is growing evidence of non-compliant behaviour in Australia, such as refusing to evacuate and travelling through hazardous areas. This can result in personal injury, loss of life, and damage to (or loss of) property. Moreover, non-compliance can place emergency services personnel in life-threatening situations when trying to save non-compliant individuals. Drawing on message compliance research in psychology and sociology, a taxonomy of message types was developed to ascertain how emergency messaging can be improved to produce compliant behaviour. Method A review of message compliance literature was conducted to develop the taxonomy of message types previously found to achieve compliance. Seven categories were identified: direct-rational, manipulation, negative phrasing, positive phrasing, exchange appeals, normative appeals, and appeals to self. A content analysis was then conducted to assess the emergency messages evident in the Australian emergency management context. The existing messages were aligned with the literature to identify opportunities to improve emergency messaging. Results & Conclusion The results suggest there is an opportunity to improve the effectiveness of emergency messaging to increase compliance during the response and early recovery phases of a natural disaster. While some message types cannot legally or ethically be used in emergency communication (e.g. manipulative messaging), there is an opportunity to create more persuasive messages (e.g. appeals to self) that personalise the individual’s perception of risk, triggering them to comply with the message.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In making this submission, we suggest that Australia learn from the experiences of other jurisdictions, and avoid some of the mistakes that have been made. In particular, this involves: * Ensuring that adequate information is available to evaluate the success of the scheme * Ensuring that notices sent to consumers provide full and accurate information that helps them understand their rights and options * Limiting the potential abuse of the system, and particularly attempts to intimidate consumers into paying unfair penalties through ‘speculative invoicing’ * Avoiding the potential for actual or perceived bias in the scheme’s oversight body

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work is a MATLAB/Simulink model of a controller for a three-phase, four-wire, grid-interactive inverter. The model provides capacity for simulating the performance of power electroinic hardware, as well as code generation for an embedded controller. The implemented hardware topology is a three-leg bridge with a neutral connection to the centre-tap of the DC bus. An LQR-based current controller and MAF-based phase detector are implemented. The model is configured for code generation for a Texas Instruments TMS320F28335 Digital Signal Processor (DSP).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Code of Banking Practice is one of the oldest examples of consumer protection provided through self-regulation in the Australian financial services sector. However, since the Banking Code was first released in 1993, the volume of consumer protection legislation applying to banks has increased exponentially and parts of the Banking Code that once provided new consumer rights have now been largely superseded by legislation. In light of the increasingly complex set of laws and regulations that govern the relationship between banks and their consumer and small business customers it could be argued that the Banking Code has a limited future role. However, an analysis of the Banking Code shows that it adds to the consumer protection standards provided by legislation and can continue to facilitate improvements in the standards of subscribing banks and of other institutions in the financial services sector. Self-regulation and industry codes should continue to be part of the regulatory mix. Any regulatory changes that flow from the recent Financial System Inquiry should also facilitate and support the self-regulation role, but the government should also consider further changes to encourage improvements in industry codes and ensure that the implicit regulatory benefits that are provided, in part, because of the existence of industry codes, are made explicit and made available only to code subscribers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides an important and timely overview of a conceptual framework designed to assist with the development of message content, as well as the evaluation, of persuasive health messages. While an earlier version of this framework was presented in a prior publication by the authors in 2009, important refinements to the framework have seen it evolve in recent years, warranting the need for an updated review. This paper outlines the Step approach to Message Design and Testing (or SatMDT) in accordance with the theoretical evidence which underpins, as well as empirical evidence which demonstrates the relevance and feasibility, of each of the framework’s steps. The development and testing of the framework have thus far been based exclusively within the road safety advertising context; however, the view expressed herein is that the framework may have broader appeal and application to the health persuasion context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Flexing, or Flex, is a street dance style that originated in Jamaica in the 1990s and grew up on the streets of Brooklyn, East New York. Performed to dancehall and reggae music, it has since evolved into a protest movement - an avenue for “flexors” to rally against social injustice, police brutality and racism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Widening participation brings with it increasing diversity, increased variation in the level of academic preparedness (Clarke, 2011; Nelson, Clarke, & Kift 2010). Cultural capital coupled with negotiating the academic culture creates an environment based on many assumptions about academic writing and university culture. Variations in staff and student expectations relating to the teaching and learning experience is captured in a range of national and institutional data (AUSSE, CEQ, LEX). Nationally, AUSSE data (2009) indicates that communication, writing, speaking and analytic skills, staff expectations are quite a bit higher than students. The research team noted a recognisable shift in the changing cohort of students and their understanding and engagement with feedback and CRAs, as well as variations in teaching staff and student expectations. The current reality of tutor and student roles is that: - Students self select when/how they access lectures and tutorials. - Shorter tutorial times result in reduced opportunity to develop rapport with students. - CRAs are not always used consistently by staff (different marking styles and levels of feedback). - Marking is not always undertaken by the student’s tutor/lecturer. - Student support services might be recommended to students once a poor grade has been given. Students can perceive this as remedial and a further sense of failure. - CRA sheet has a mark /grade attached to it. Stigma attached to low mark. Hard to focus on the CRA feedback with a poor mark etched next to it. - Limited opportunities for sessionals to access professional development to assist with engaging students and feedback. - FYE resources exist, however academic time is a factor in exploring and embedding these resources. Feedback is another area with differing expectations and understandings. Sadler (2009) contends that students are not equipped to decode the statements properly. For students to be able to apply feedback, they need to understand the meaning of the feedback statement. They also need to identify, the particular aspects of their work that need attention. The proposed Checklist/guide would be one page and submitted with each assessment piece thereby providing an interface to engage students and tutors in managing first year understandings and expectations around CRAs, feedback, and academic practice.