938 resultados para Cryptographic key


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Governments, authorities, and organisations dedicate significant resources to encourage communities to prepare for and respond to natural hazards such as cyclones, earthquakes, floods, and bushfires. However, recent events, media attention, and ongoing academic research continue to highlight cases of non-compliance including swift water rescues. Individuals who fail to comply with instructions issued during natural hazards significantly impede the emergency response because they divert resources to compliance-enforcement and risk the lives of emergency service workers who may be required to assist them. An initial investigation of the field suggests several assumptions or practices that influence emergency management policy, communication strategy, and community behaviours during natural hazards: 1) that community members will comply with instructions issued by governments and agencies that represent the most authoritative voice, 2) that communication campaigns are shaped by intuition rather than evidence-based approaches (Wood et al., 2012), and 3) that emergency communication is linear and directional. This extended abstract represents the first stage of a collaborative research project that integrates industry and cross-disciplinary perspectives to provide evidence-based approaches for emergency and risk communication during the response and recovery phases of a natural hazard. Specifically, this abstract focuses on the approach taken and key elements that will form the development of a typology of compliance-gaining messages during the response phase of natural hazards, which will be the focus of the conference presentation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examins the relationship between firm performance and key board and audit committee variables in a sample of mid-tier listed Australian firms. Unlike the UK where the corporate governance Code specifically outlines special arrangements for companies outside the FTSE 350 index, the ASX Corporate Governance recommendations make no special provisions for mid-tier companies. Consequently, mid-tier Australian companies may be expending scarce resources in conforming with recommendations that are not value-creating.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book is an introduction to key issues in the area of crime as it connects to society. The book is divided into three parts: Understanding Crime and Criminality: introduces topics such as the social construction of crime and deviance, social control, the fear of crime, poverty and exclusion, white collar crime, victims of crime, race/gender and crime. Types of Crime and Criminality: explores examples including human trafficking, sex work, drug crime, environmental crime, cyber crime, war crime, terrorism, and interpersonal violence. Responses to Crime: looks at areas such as crime and the media, policing, moral panics, deterrence, prisons and rehabilitation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bactrocera papayae Drew & Hancock, Bactrocera philippinensis Drew & Hancock, Bactrocera carambolae Drew & Hancock, and Bactrocera invadens Drew, Tsuruta & White are four horticultural pest tephritid fruit fly species that are highly similar, morphologically and genetically, to the destructive pest, the Oriental fruit fly, Bactrocera dorsalis (Hendel) (Diptera: Tephritidae). This similarity has rendered the discovery of reliable diagnostic characters problematic, which, in view of the economic importance of these taxa and the international trade implications, has resulted in ongoing difficulties for many areas of plant protection and food security. Consequently, a major international collaborative and integrated multidisciplinary research effort was initiated in 2009 to build upon existing literature with the specific aim of resolving biological species limits among B. papayae, B. philippinensis, B. carambolae, B. invadens and B. dorsalis to overcome constraints to pest management and international trade. Bactrocera philippinensis has recently been synonymized with B. papayae as a result of this initiative and this review corroborates that finding; however, the other names remain in use. While consistent characters have been found to reliably distinguish B. carambolae from B. dorsalis, B. invadens and B. papayae, no such characters have been found to differentiate the latter three putative species. We conclude that B. carambolae is a valid species and that the remaining taxa, B. dorsalis, B. invadens and B. papayae, represent the same species. Thus, we consider B. dorsalis (Hendel) as the senior synonym of B. papayae Drew and Hancock syn.n. and B. invadens Drew, Tsuruta & White syn.n. A redescription of B. dorsalis is provided. Given the agricultural importance of B. dorsalis, this taxonomic decision will have significant global plant biosecurity implications, affecting pest management, quarantine, international trade, postharvest treatment and basic research. Throughout the paper, we emphasize the value of independent and multidisciplinary tools in delimiting species, particularly in complicated cases involving morphologically cryptic taxa.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Though popular, concepts such as Toffler's 'prosumer' (1970; 1980; 1990) are inherently limited in their ability to accurately describe the makeup and dynamics of current co-creative environments, from fundamentally non-profit initiatives like the Wikipedia to user-industry partnerships that engage in crowdsourcing and the development of collective intelligence. Instead, the success or failure of such projects can be understood best if the traditional producer/consumer divide is dissolved, allowing for the emergence of the produser (Bruns, 2008). A close investigation of leading spaces for produsage makes it possible to extract the key principles which underpin and guide such content co-creation, and to identify how innovative pro-am partnerships between commercial entities and user communities might be structured in order to maximise the benefits that both sides will be able to draw from such collaboration. This chapter will outline these principles, and point to successes and failures in applying them to pro- am initiatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper offers a definition of elite media arguing their content focus will sufficiently meet social responsibility needs of democracy. Its assumptions come from the Finkelstein and Leveson Inquiries and regulatory British Royal Charter (2013). These provide guidelines on how media outlets meet ‘social responsibility’ standards, e.g. press has a ‘responsibility to be fair and accurate’ (Finkelstein); ethical press will feel a responsibility to ‘hold power to account’ (Leveson); news media ‘will be held strictly accountable’ (RC). The paper invokes the British principle of media opting-in to observe standards, and so serve the democracy. It will give examples from existing media, and consider social responsibility of media more generally. Obvious cases of ‘quality’ media: public broadcasters, e.g. BBC, Al-Jazeera, and ‘quality’ press, e.g. NYT, Süddeutscher Zeitung, but also community broadcasters, specialised magazines, news agencies, distinctive web logs, and others. Where providing commentary, these abjure gratuitous opinion -- meeting a standard of reasoned, informational and fair. Funding is almost a definer, many such services supported by the state, private trusts, public institutions or volunteering by staff. Literature supporting discussion on elite media will include their identity as primarily committed to a public good, e.g. the ‘Public Value Test’, Moe and Donders (2011); with reference also to recent literature on developing public service media. Within its limits the paper will treat social media as participants among all media, including elite, and as a parallel dimension of mass communication founded on inter-activity. Elite media will fulfil the need for social responsibility, firstly by providing one space, a ‘plenary’ for debate. Second is the notion of building public recognition of elite media as trustworthy. Third is the fact that elite media together are a large sector with resources to sustain social cohesion and debate; notwithstanding pressure on funds, and impacts of digital transformation undermining employment in media more than in most industries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over recent years, the health, transport and environment sectors have been increasingly focused on the promotion of transport cycling. From a health perspective, transport cycling is recognised as a beneficial form of physical activity as it can be easily integrated into daily living, is done at an intensity that confers health benefits, and is associated with reductions in mortality and morbidity [1]. From a safety perspective, the risk of a serious cycling injury decreases as cycling increases [2] as having more cyclists on roads increases motor vehicle drivers’ awareness of cyclists and in turn makes cycling safer. Whereas cycling for recreation is the fourth most commonly reported physical activity among Australian adults [3], transport cycling is an underutilised travel mode. Approximately 1.3% of journeys to work in Australia are made by bicycle [4]. This low prevalence is mirrored in the UK and the US, but not in some European countries like the Netherlands and Denmark, where over 18% and 26%, respectively, of all journeys are made by bicycle [5]. In the past decade, concerted efforts have been made by Australian state and local governments to increase cycling rates [6]. Notably, Melbourne, Sydney and Brisbane have implemented policies, increased bicycle commuting infrastructure, and offered information and promotion programs to encourage commuter cycling [6,7]. Governments have also developed comprehensive longterm plans for guiding future cycling strategies, using lessons learned from around the world in developing successful cycling policy and promotion [6,7]. Changes in transport cycling rates in inner cities since these efforts have been implemented are encouraging. In Sydney, census data indicate an 83% increase in the number of people using a bicycle for commuting between 2001 and 2011 [8]. Counts of bicycles being ridden along major cycling commuter routes indicate increases in weekday morning cycling trips in Brisbane (63% increase from 2004 to 2010) [7] and in Melbourne (a 43% increase from 2006 to 2008) [9]. However, bicycle mode share to work has changed little: for example, between 2001 and 2011, it decreased slightly from 1.6% to 1.3% in Brisbane [10,11]. Researchers have been investigating factors that may be contributing to low rates of cycling for transport, to inform future policy and programming to encourage transport cycling. The aim of this paper is to overview our work to date in this area of research in Queensland.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the past few years, research works on the topic of secure outsourcing of cryptographic computations has drawn significant attention from academics in security and cryptology disciplines as well as information security practitioners. One main reason for this interest is their application for resource constrained devices such as RFID tags. While there has been significant progress in this domain since Hohenberger and Lysyanskaya have provided formal security notions for secure computation delegation, there are some interesting challenges that need to be solved that can be useful towards a wider deployment of cryptographic protocols that enable secure outsourcing of cryptographic computations. This position paper brings out these challenging problems with RFID technology as the use case together with our ideas, where applicable, that can provide a direction towards solving the problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A popular lexicon for announcing partnerships within aviation is being ‘on-board’. Like boarding a plane, business partnerships requires trust in the expertise and the philosophy of another organisation. This paper reports upon the process and findings from the completion of a customer engagement project within a leading Australian Airport, as part of the wider uptake of design-led innovation. The project was completed bilaterally with Airport Corporation and prominent retail business partner undertaking a design-led approach to collaboratively explore an observed market trend affecting the performance of both businesses. A design-led catalyst facilitated the completion of this project, working within the Airport Corporation to disseminate the skills and philosophy of design over an 18 month period using an action research method. Findings reveal that the working environment necessary for design to be utilised requires; trust in the design-led approach as a new and exploratory way of completing work; leadership within the execution and delivery of project deliverables, and; a shared intrinsic motivation to develop new skills through a design-led approach which challenges a business-as-usual mentality (BAU). Design-led innovation can be deployed specifically to strengthen business partnerships through collaborative and explorative customer engagement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.