816 resultados para public key cryptography
Resumo:
Since the mid 80ies the Trans ‐European Transport Network (TEN‐T) policy has been setting the framework for the development of infrastructure for the smooth functioning of the internal market within the European Union (EU). Public Private Partnerships (PPPs) have always been regarded by the EU as a key instrument to promote the TEN‐T.
Resumo:
The understanding of public perception to climate change is an essential factor in the development of adaptation policies. In the Mediterranean, agriculture, as the largest consumer of freshwater, has the highest potential to suffer adverse impacts of climate change. Future water availability predictions, conflicting interests among stakeholders and an increasing social concern about the environment further aggravate the situation. Therefore studying public support for adaptation policies can play a key role in successfully adapting the sector. The study site, approximately 36,000 hectares of rice fields in Seville (Spain), exemplifies an area in the Mediterranean where water needs to be carefully re-allocated in view of the limitations anticipated by climate change scenarios; in particular where conflicts will arise between water for agriculture and water for ‘natural’ ecosystems. This paper proposes an ex-ante evaluation of the societal support for adaptation policies. A survey of 117 respondents was conducted and a Logit model utilized to analyze which predictors positively or negatively affect people's support for adaptation policies. Results suggest that the main barriers to support these policies were economic losses and low climate change concern whereas the primary motivation factor was environmental commitment. Additionally, the main socio-demographic determinants were gender, age, education and family structure. In order to improve societal support for climate change adaptation policies, implementing educational and awareness raising initiatives will be the main challenges for policy makers to overcome.
Resumo:
Quality of service should not be overlooked in public transport planning and policy making, as it influences modal shift from car use to more sustainable means. Little research has been conducted on the quality of public transport interchanges from the perspective of current travellers (i.e. perceived quality). This work is thus aimed at identifying key quality factors in urban interchanges, through an exploratory approach (multiple correspondence analysis) that provides novel elements for further research. The methodology was applied at interchanges in Madrid and Gothenburg and the data used in the analysis were collected through customer satisfaction surveys conducted in 2011. The analysis identified five key quality factors per interchange. Ticketing plays a key role at both interchanges while physical and environmental issues emerged at Avenida de America in Madrid, and services, temporal issues and interconnectivity characterise Gothenburg central station. Compared with other quality aspects, classical issues such as safety/security and information are not perceived as important by intermodal travellers.
Resumo:
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and, although its efficiency is not optimal, it has become the de-facto standard for practical implementations of information reconciliation in quantum key distribution. The aim of this work is to analyze the performance of Cascade, to discuss its strengths, weaknesses and optimization possibilities, comparing with some of the modified versions that have been proposed in the literature. When looking at all design trade-offs, a new view emerges that allows to put forward a number of guidelines and propose near optimal parameters for the practical implementation of Cascade improving performance significantly in comparison with all previous proposals.
Resumo:
Cascade is an information reconciliation protocol proposed in the context of secret key agreement in quantum cryptography. This protocol allows removing discrepancies in two partially correlated sequences that belong to distant parties, connected through a public noiseless channel. It is highly interactive, thus requiring a large number of channel communications between the parties to proceed and, although its efficiency is not optimal, it has become the de-facto standard for practical implementations of information reconciliation in quantum key distribution. The aim of this work is to analyze the performance of Cascade, to discuss its strengths, weaknesses and optimization possibilities, comparing with some of the modified versions that have been proposed in the literature. When looking at all design trade-offs, a new view emerges that allows to put forward a number of guidelines and propose near optimal parameters for the practical implementation of Cascade improving performance significantly in comparison with all previous proposals.
Resumo:
This paper reports the results of the assessment of a range of measures implemented in bus systems in five European cities to improve the use of public transport by increasing its attractiveness and enhancing its image in urban areas. This research was conducted as part of the EBSF project (European Bus System of the Future) from 2008 to 2012. New buses (prototypes), new vehicle and infrastructure technologies, and operational best practices were introduced, all of which were combined in a system approach. The measures were assessed using multicriteria analysis to simultaneously evaluate a certain number of criteria that need to be aggregated. Each criterion is measured by one or more key performance indicators (KPI) calculated in two scenarios (reference scenario, with no measure implemented; and project scenario, with the implementation of some measures), in order to evaluate the difference in the KPI performance between the reference and project scenario. The results indicate that the measures produce a greater benefit in issues related to bus system productivity and customer satisfaction, with the greatest impact on aspects of perceptions of comfort, cleanliness and quality of service, information to passengers and environmental issues. The study also reveals that the implementation of several measures has greater social utility than very specific and isolated measures.
Resumo:
The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during one-way information reconciliation is flawed and we propose an improved estimate.
Resumo:
We report on a variant of the so-called Cascade protocol that is well-known for its usage as information reconciliation protocol in quantum cryptography. A theoretical analysis of the optimal size of the parity check blocks is provided. We obtain a very small leakage which is for block sizes of 2^16 typically only 2.5% above the Shannon limit, and notably, this holds for a QBER between 1% and 50%. For a QBER between 1% and 6% the leakage is only 2% above the Shannon limit. As comparison, the leakage of the original Cascade algorithm is 20% (40%) above the Shannon limit for a QBER of 10% (35%).
Resumo:
The postprocessing or secret-key distillation process in quantum key distribution (QKD) mainly involves two well-known procedures: information reconciliation and privacy amplification. Information or key reconciliation has been customarily studied in terms of efficiency. During this, some information needs to be disclosed for reconciling discrepancies in the exchanged keys. The leakage of information is lower bounded by a theoretical limit, and is usually parameterized by the reconciliation efficiency (or inefficiency), i.e. the ratio of additional information disclosed over the Shannon limit. Most techniques for reconciling errors in QKD try to optimize this parameter. For instance, the well-known Cascade (probably the most widely used procedure for reconciling errors in QKD) was recently shown to have an average efficiency of 1.05 at the cost of a high interactivity (number of exchanged messages). Modern coding techniques, such as rate-adaptive low-density parity-check (LDPC) codes were also shown to achieve similar efficiency values exchanging only one message, or even better values with few interactivity and shorter block-length codes.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
Increasing foreign private investment in developing countries explains why the Public-Private Investment (PPI) is becoming a key tool to reach the development goal. This article analyzes the relation between PPI in infrastructure and agricultural exports in developing countries. We use the panel data approach (52 countries and 17 years). Results show that PPI in infrastructure has a positive impact on agricultural exports of developing countries. The impact is greater in developing countries with higher income rates. This suggests that the lower income countries require the intervention of public sector without which private investment cannot help to economic development.
Resumo:
In the EU context extraction of shale and oil gas by hydraulic fracturing (fracking) differs from country to country in terms of legislation and implementation. While fossil fuel extraction using this technology is currently taking place in the UK, Germany and France have adopted respective moratoria. In between is the Spanish case, where hydrocarbon extraction projects through fracking have to undergo mandatory and routine environmental assessment in accordance with the last changes to environmental regulations. Nowadays Spain is at the crossroad with respect to the future of this technology. We presume a social conflictt in our country since the position and strategy of the involved and confronted social actors -national, regional and local authorities, energy companies, scientists, NGO and other social organization- are going to play key and likely divergent roles in its industrial implementation and public acceptance. In order to improve knowledge on how to address these controverted situations from the own engineering context, the affiliated units from the Higher Technical School of Mines and Energy Engineering at UPM have been working on a transversal program to teach values and ethics. Over the past seven years, this pioneering experience has shown the usefulness of applying a consequentialist ethics, based on a case-by-case approach and costs-benefits analysis both for action and inaction. As a result of this initiative a theoretical concept has arisen and crystallized in this field: it is named Inter-ethics. This theoretical perspective can be very helpful in complex situations, with multi-stakeholders and plurality of interests, when ethical management requires the interaction between the respective ethics of each group; professional ethics of a single group is not enough. Under this inter-ethics theoretical framework and applying content analysis techniques, this paper explores the articulation of the discourse in favour and against fracking technology and its underlying values as manifested in the Spanish traditional mass media and emerging social media such as Youtube. Results show that Spanish public discourse on fracking technology includes the costs-benefits analysis to communicate how natural resources from local communities may be affected by these facilities due to environmental, health and economic consequences. Furthermore, this technology is represented as a solution to the "demand of energy" according to the optimistic discourse while, from a pessimistic view, fracking is often framed as a source "environmental problems" and even natural disasters as possible earthquakes. In this latter case, this negative representation could have been influenced by the closure of a macro project to store injected natural gas in the Mediterranean Sea using the old facilities of an oil exploitation in Amposta (Proyecto Cástor). The closure of this project was due to the occurrence of earthquakes whose intensity was higher than the originally expected by the experts in the assessment stage of the project.
Resumo:
In 1995, the National Library of Medicine (NLM) and the Public Health Service (PHS) recommended that special attention be given to the information needs of unaffiliated public health professionals. In response, the National Network of Libraries of Medicine (NN/LM) Greater Midwest Region initiated a collaborative outreach program for public health professionals working in rural east and central Iowa. Five public health agencies were provided equipment, training, and support for accessing the Internet. Key factors in the success of this project were: (1) the role of collaborating agencies in the implementation and ongoing success of information access outreach projects; (2) knowledge of the socio-cultural factors that influence the information-seeking habits of project participants (public health professionals); and (3) management of changing or varying technological infrastructures. Working with their funding, personnel from federal, state, and local governments enhanced the information-seeking skills of public health professionals in rural eastern and central Iowa communities.
Resumo:
Although 23 states and the District of Columbia have now legalized marijuana for medical purposes, marijuana remains a prohibited substance under federal law. Because the production, sale, possession and use of marijuana remain illegal, there is a risk of prosecution under federal laws. Furthermore, those who help marijuana users and providers put themselves at risk — federal law punishes not only those who violate drug laws but also those who assist or conspire with them to do so. In the case of lawyers representing marijuana users and businesspeople, this means not only the real (though remote) risk of criminal prosecution but also the more immediate risk of professional discipline. Elsewhere, we wrote about the difficult place in which lawyers find themselves when representing marijuana clients. We argued that while both the criminal law and the rules of professional conduct rightly require legal obedience from lawyers, other countervailing factors must be considered when evaluating lawyers’ representation of marijuana clients. In particular, we asserted that considerations of equity and access to justice weigh dispositively in favor of protecting lawyers who endeavor to help their clients comply with state marijuana laws, and we suggested means of interpreting relevant criminal law provisions and rules of professional conduct to achieve this result. This article builds on that analysis, taking on the particular issue of the public lawyer’s’ role in marijuana regulation. For government lawyers, the key issues in exercising discretion in the context of marijuana are not clients’ access to the law and equality but rather determining the clients’ wishes and serving them diligently and ethically. Lawyers representing state agencies, legislatures and the executive branch of government draft and interpret the rules and regulations regarding marijuana. Lawyers for federal, state and local governments then interpret those rules to determine the obligations and responsibilities of those they represent and to help their clients meet those obligations and carry out their required tasks. Both state and federal prosecutors are charged with determining what conduct remains illegal under the new rules and, perhaps more importantly, with exercising discretion regarding whom to prosecute and to what extent. Marijuana regulation is not a niche area of government regulation; it will influence the practice of virtually every public lawyer in the years to come. Public lawyers must understand the changes in marijuana law and the implications for government clients. Given the pervasiveness of the modern regulatory state, the situation is no easier — and, in many ways, it is more complicated — for public lawyers than it is for private ones. Public lawyers face myriad practice challenges with respect to marijuana law reform, and while we do not purport to identify and resolve all of the issues that are sure to arise in this short paper, we hope that the article helps alert public lawyers to some of the risks involved in participating in marijuana regulation so that they can think carefully about their obligations when these issues arise.