982 resultados para Advanced Encryption Standard


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We examine the use of randomness extraction and expansion in key agreement (KA) pro- tocols to generate uniformly random keys in the standard model. Although existing works provide the basic theorems necessary, they lack details or examples of appropriate cryptographic primitives and/or parameter sizes. This has lead to the large amount of min-entropy needed in the (non-uniform) shared secret being overlooked in proposals and efficiency comparisons of KA protocols. We therefore summa- rize existing work in the area and examine the security levels achieved with the use of various extractors and expanders for particular parameter sizes. The tables presented herein show that the shared secret needs a min-entropy of at least 292 bits (and even more with more realistic assumptions) to achieve an overall security level of 80 bits using the extractors and expanders we consider. The tables may be used to �nd the min-entropy required for various security levels and assumptions. We also �nd that when using the short exponent theorems of Gennaro et al., the short exponents may need to be much longer than they suggested.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The reported study was conducted to compare and contrast current manufacturing practices between two countries, Australia and Malaysia, and identify the practices that significantly influence their manufacturing performances. The results are based on data collected from surveys using a standard questionnaire in both countries. Evidence indicates that product quality and reliability is the main competitive factor for manufacturers. Maintaining a supplier rating system and regularly updating it with field failure and warranty data and making use of product data management are found to be effective manufacturing practices. In terms of the investigated manufacturing performance, Australian manufacturers are marginally ahead of their Malaysian counterparts. However, Malaysian manufacturers came out ahead on most dimensions of advanced quality and manufacturing practices, particularly in the adoption of product data management, effective supply chains and relationships with suppliers and customers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The composition of many professional services firms in the Urban Development area has moved away from a discipline specific ‘silo’ structure to a more multidisciplinary environment. The benefits of multidisciplinarity have been seen in industry by providing synergies across many of the related disciplines. Similarly, the Queensland University of Technology, Bachelor of Urban Development degree has sought to broaden the knowledge base of students and achieve a greater level of synergy between related urban development disciplines through the introduction of generic and multidisciplinary units. This study aims to evaluate the effectiveness of delivering core property units in a multidisciplinary context. A comparative analysis has been undertaken between core property units and more generic units offered in a multidisciplinary context from introductory, intermediate and advanced years within the property program. This analysis was based on data collected from course performance surveys, student performance results, a student focus group and was informed by a reflective process from the student perspective and lecturer/ tutor feedback. The study showed that there are many benefits associated with multidisciplinary unit offerings across the QUT Urban Development program particularly in the more generic units. However, these units require a greater degree of management. It is more difficult to organise, teach and coordinate multidisciplinary student cohorts due to a difference in prior knowledge and experience between each of the discipline groups. In addition, the interaction between lecturers/ tutors and the students frequently becomes more limited. A perception exists within the student body that this more limited face to face contact with academic staff is not valuable which may be exacerbated by the quality of complimentary online teaching materials. For many academics, non-attendance at lectures was coupled with an increase in email communication. From the limited data collected during the study there appears to be no clear correlation between large multidisciplinary student classes and student academic performance or satisfaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. AE is potentially more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message and in a separate pass, providing integrity protection by generating a Message Authentication Code (MAC) tag. This paper presents results on the analysis of three AE stream ciphers submitted to the recently completed eSTREAM competition. We classify the ciphers based on the methods the ciphers use to provide authenticated encryption and discuss possible methods for mounting attacks on these ciphers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This document describes algorithms based on Elliptic Cryptography (ECC) for use within the Secure Shell (SSH) transport protocol. In particular, it specifies Elliptic Curve Diffie-Hellman (ECDH) key agreement, Elliptic Curve Menezes-Qu-Vanstone (ECMQV) key agreement, and Elliptic Curve Digital Signature Algorithm (ECDSA) for use in the SSH Transport Layer protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract—Corneal topography estimation that is based on the Placido disk principle relies on good quality of precorneal tear film and sufficiently wide eyelid (palpebral) aperture to avoid reflections from eyelashes. However, in practice, these conditions are not always fulfilled resulting in missing regions, smaller corneal coverage, and subsequently poorer estimates of corneal topography. Our aim was to enhance the standard operating range of a Placido disk videokeratoscope to obtain reliable corneal topography estimates in patients with poor tear film quality, such as encountered in those diagnosed with dry eye, and with narrower palpebral apertures as in the case of Asian subjects. This was achieved by incorporating in the instrument’s own topography estimation algorithm an image processing technique that comprises a polar-domain adaptive filter and amorphological closing operator. The experimental results from measurements of test surfaces and real corneas showed that the incorporation of the proposed technique results in better estimates of corneal topography, and, in many cases, to a significant increase in the estimated coverage area making such an enhanced videokeratoscope a better tool for clinicians.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Scalable video coding of H.264/AVC standard enables adaptive and flexible delivery for multiple devices and various network conditions. Only a few works have addressed the influence of different scalability parameters (frame rate, spatial resolution, and SNR) on the user perceived quality within a limited scope. In this paper, we have conducted an experiment of subjective quality assessment for video sequences encoded with H.264/SVC to gain a better understanding of the correlation between video content and UPQ at all scalable layers and the impact of rate-distortion method and different scalabilities on bitrate and UPQ. Findings from this experiment will contribute to a user-centered design of adaptive delivery of scalable video stream.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We aimed to investigate the naturally occurring horizontal plane movements of a head stabilized in a standard ophthalmic headrest and to analyze their magnitude, velocity, spectral characteristics, and correlation to the cardio pulmonary system. Two custom-made air-coupled highly accurate (±2 μm)ultrasound transducers were used to measure the displacements of the head in different horizontal directions with a sampling frequency of 100 Hz. Synchronously to the head movements, an electrocardiogram (ECG) signal was recorded. Three healthy subjects participated in the study. Frequency analysis of the recorded head movements and their velocities was carried out, and functions of coherence between the two displacements and the ECG signal were calculated. Frequency of respiration and the heartbeat were clearly visible in all recorded head movements. The amplitude of head displacements was typically in the range of ±100 μm. The first harmonic of the heartbeat (in the range of 2–3 Hz), rather than its principal frequency, was found to be the dominant frequency of both head movements and their velocities. Coherence analysis showed high interdependence between the considered signals for frequencies of up to 20 Hz. These findings may contribute to the design of better ophthalmic headrests and should help other studies in the decision making of whether to use a heavy headrest or a bite bar.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is the purpose of this article to examine the means curently available to judges to achieve a workable balance between providing appropriate consumer protection to signatories of standard form contractors while still retaining adequate respect for the sanctity of contract, and, based on this analysis, to determine whether a significantly greater scope of contract (re)construction is likely to become the norm in most common law jurisdictions in the coming decades.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: The component modules in the standard BEAMnrc distribution may appear to be insufficient to model micro-multileaf collimators that have tri-faceted leaf ends and complex leaf profiles. This note indicates, however, that accurate Monte Carlo simulations of radiotherapy beams defined by a complex collimation device can be completed using BEAMnrc's standard VARMLC component module.---------- Methods: That this simple collimator model can produce spatially and dosimetrically accurate micro-collimated fields is illustrated using comparisons with ion chamber and film measurements of the dose deposited by square and irregular fields incident on planar, homogeneous water phantoms.---------- Results: Monte Carlo dose calculations for on- and off-axis fields are shown to produce good agreement with experimental values, even upon close examination of the penumbrae.--------- Conclusions: The use of a VARMLC model of the micro-multileaf collimator, along with a commissioned model of the associated linear accelerator, is therefore recommended as an alternative to the development or use of in-house or third-party component modules for simulating stereotactic radiotherapy and radiosurgery treatments. Simulation parameters for the VARMLC model are provided which should allow other researchers to adapt and use this model to study clinical stereotactic radiotherapy treatments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: This study aimed to enhance the capacity of oncology nurses to provide supportive care for patients with advanced cancer who have dependent children. ---------- Method: This was a pilot study of an educational intervention comprising a study-developed self-directed learning manual, supported by a day-long communication skills training workshop. Evaluation pre- and post-training included measures of stress and burnout, self-reports of confidence and attitudes, responses to clinical vignettes and video-taped interviews with simulated patients.---------- Results: Nurses found the educational intervention highly acceptable, and reported increased confidence in their ability to provide information and support for parents, and to initiate discussion about emotional issues. There were significant improvements in general communication skills and skills specific to this training, as well as reduced use of blocking.---------- Conclusion: Brief communication skills training supplemented with tailored educational resources can enhance confidence skills and knowledge of oncology nurses regarding their supportive care of parents with advanced cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A teaching and learning development project is currently under way at Queensland University of Technology to develop advanced technology videotapes for use with the delivery of structural engineering courses. These tapes consist of integrated computer and laboratory simulations of important concepts, and behaviour of structures and their components for a number of structural engineering subjects. They will be used as part of the regular lectures and thus will not only improve the quality of lectures and learning environment, but also will be able to replace the ever-dwindling laboratory teaching in these subjects. The use of these videotapes, developed using advanced computer graphics, data visualization and video technologies, will enrich the learning process of the current diverse engineering student body. This paper presents the details of this new method, the methodology used, the results and evaluation in relation to one of the structural engineering subjects, steel structures.