981 resultados para ANION-EXCHANGE
Resumo:
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.
Resumo:
The firm is faced with a decision concerning the nature of intra-organizational exchange relationships with internal human resources and the nature or inter-organizational exchange relationships with market firms. In both situations, the firm can develop an exchange that ranges from a discrete exchange to a relational exchange. Transaction Cost Economics (TCE) and the Resource Dependency View (RDV) represent alternative efficiency-based explanations fo the nature of the exchange relationship. The aim of the paper is to test these two theories in respect of air conditioning maintenance in retail centres. Multiple sources of information are genereated from case studies of Australian retail centres to test these theories in respoect of internalized operations management (concerning strategic aspects of air conditioning maintenance) and externalized planned routine air conditioning maintenance. The analysis of the data centres on pattern matching. It is concluded that the data supports TCE - on the basis of a development in TCE's contractual schema. Further research is suggested towards taking a pluralistic stance and developing a combined efficiency and power hypothesis - upon which Williamson has speculated. For practice, the conclusions also offer a timely cautionary note concerning the adoption of one approach in all exchange relationships.
Resumo:
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Tellurates are rare minerals as the tellurate anion is readily reduced to the tellurite ion. Often minerals with both tellurate and tellurite anions in the mineral are found. An example of such a mineral containing tellurate and tellurite is yecoraite. Raman spectroscopy has been used to study this mineral, the exact structure of which is unknown. Two Raman bands at 796 and 808 cm-1 are assigned to the ν1 (TeO4)2- symmetric and ν3 (TeO3)2- antisymmetric stretching modes and Raman bands at 699 cm-1 are attributed to the the ν3 (TeO4)2- antisymmetric stretching mode and the band at 690 cm-1 to the ν1 (TeO3)2- symmetric stretching mode. The intense band at 465 cm-1 with a shoulder at 470 cm-1 is assigned the (TeO4)2- and (TeO3)2- bending modes. Prominent Raman bands are observed at 2878, 2936, 3180 and 3400 cm-1. The band at 3936 cm-1 appears quite distinct and the observation of multiple bands indicates the water molecules in the yecoraite structure are not equivalent. The values for the OH stretching vibrations listed provide hydrogen bond distances of 2.625 Å (2878 cm-1), 2.636 Å (2936 cm-1), 2.697 Å (3180 cm-1) and 2.798 Å (3400 cm-1). This range of hydrogen bonding contributes to the stability of the mineral. A comparison of the Raman spectra of yecoraite with that of tellurate containing minerals kuranakhite, tlapallite and xocomecatlite is made.
Resumo:
Despite its importance in the development of competitive advantage, attempts to unify diverse classifications of business-to-business relational exchange have been largely unsuccessful. We used 18 semi-structured, in-depth interviews with managers from a wide range of industries to explain the business-to-business relational exchange construct. Analysis of the data revealed that business-to-business relational exchange comprises five key dimensions. These are communication, compatibility, commitment, trust and power symmetry. The research highlights the importance of personal interaction in business relationships and provided additional insights into the importance of affective commitment. In addition we reveal a number of negative consequences of affective commitment, which have been previously unexplored. A new conceptual model of business-to-business relational exchange is presented, which synthesises these findings and directs future research.
Resumo:
The mixed anion mineral parnauite Cu9[(OH)10|SO4|(AsO4)2].7H2O has been studied by Raman spectroscopy. Characteristic bands associated with arsenate, sulphate, hydroxyl units are identified. Broad bands are observed and are resolved into component bands. Two intense bands at 859 and 830 cm-1 are assigned to the 1 (AsO4)3- symmetric stretching and 3 (AsO4)3- antisymmetric stretching modes. The comparatively sharp band at 976 cm-1 is assigned to the ν1 (SO4)2- symmetric stretching mode and a broad spectral profile centered upon 1097 cm-1 is attributed to the ν3 (SO4)2- antisymmetric stretching mode. A comparison of the Raman spectra is made with other arsenate bearing minerals such as carminite, clinotyrolite, kankite, tilasite and pharmacosiderite.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.