180 resultados para CRYPTOGRAPHIC PAIRINGS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present research investigated blink startle modulation during the anticipation of pleasant, unpleasant, or neutral pictures. In Experiment 1 (N = 18), participants were presented with three different tone-picture pairings. Tones differed in pitch and were followed by pleasant, neutral or unpleasant pictures. Acoustic blink reflexes were elicited during some tones and during stimulus free intervals. Blink facilitation during tones that preceded pleasant and unpleasant pictures was larger than during the tone that preceded neutral pictures. Experiment 2 (N = 10) assessed whether this difference was due to a difference in the presentation frequency of the three conditions. No difference in blink facilitation between the conditions was found when pictures of flowers and mushrooms replaced the pleasant and unpleasant pictures, indicating that picture content was instrumental in causing the differential blink facilitation in Experiment 1. The results from Experiment 1 seem to indicate that startle modulation during the anticipation of pictorial material reflects the interest in or the arousal associated with the pictures rather than picture valence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We tested the hypothesis that tree species in a subtropical rain forest in south-east Queensland are ecologically equivalent and therefore have identical environmental requirements for their regeneration. We assessed the evidence that juveniles of species differed in their distributions in treefall gap microsites and along gradients of light availability, soil pH, soil PO4-P availability and soil NO3-N availability. Pairwise comparisons were made on a subset of the common species selected on the basis that they showed a relatively high level of positive association, and would therefore, a priori, be expected to have similar regeneration requirements. Detailed comparisons between the species failed to demonstrate evidence for species differentiation with respect to their tolerance of the disturbance associated with gap microsites or to the gradient of NO3-N availability. However, species differed markedly in their distributions along the soil pH gradient and along the gradients of light availability and soil PO4-P availability. The overall level of ecological differentiation between the species is high: seven out of the 10 possible species pairings showed evidence for ecological differentiation. Such niche differentiation amongst the juveniles of tree species may play an important role in maintaining the species richness of rain-forest communities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present series of experiments was designed to assess whether rule-based accounts of Pavlovian learning can account for cue competition effects observed after elemental training. All experiments involved initial differential conditioning training with A-US and B alone presentations. Miscuing refers to the fact that responding to A is impaired after one B-US presentation whereas interference is the impairment of responding to A after presentation of C-US pairings. Omission refers to the effects on B of A alone presentations. Experiments 1-2a provided clear evidence for miscuing whereas interference was not found after 1, 5 or 10 C-US pairings. Moreover, Experiments 3 and 3a found only weak evidence for interference in an A-US, B I C-US, D I A design used previously to show the effect. Experiments 4 and 5 failed to find any effect of US omission after one or five omission trials. The present results indicate that miscuing is more robust than is the interference effect. Moreover, the asymmetrical effects of US miscuing and US omission are difficult to accommodate within rule-based accounts of Pavlovian conditioning. (C) 2002 Elsevier Science (USA). All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. Between 1988 and 2001, we studied social relationships in the superb fairy-wren Malurus cyaneus (Latham), a cooperative breeder with male helpers in which extra-group fertilizations are more common than within-pair fertilizations. 2. Unlike other fairy-wren species, females never bred on their natal territory. First-year females dispersed either directly from their natal territory to a breeding vacancy or to a foreign 'staging-post' territory where they spent their first winter as a subordinate. Females dispersing to a foreign territory settled in larger groups. Females on foreign territories inherited the territory if the dominant female died, and were sometimes able to split the territory into two by pairing with a helper male. However, most dispersed again to obtain a vacancy. 3. Females dispersing from a staging post usually gained a neighbouring vacancy, but females gaining a vacancy directly from their natal territory travelled further, perhaps to avoid pairing or mating with related males. 4. Females frequently divorced their partner, although the majority of relationships were terminated by the death of one of the pair. If death did not intervene, one-third of pairings were terminated by female-initiated divorce within 1000 days. 5. Three divorce syndromes were recognized. First, females that failed to obtain a preferred territory moved to territories with more helpers. Secondly, females that became paired to their sons when their partner died usually divorced away from them. Thirdly, females that have been in a long relationship divorce once a son has gained the senior helper position. 6. Dispersal to avoid pairing with sons is consistent with incest avoidance. However, there may be two additional benefits. Mothers do not mate with their sons, so dispersal by the mother liberates her sons to compete for within-group matings. Further, divorcing once their son has become a breeder or a senior helper allows the female to start sons in a queue for dominance on another territory. Females that do not take this option face constraints on their ability to recruit more sons into the local neighbourhood.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic software development is a challenging eld: high performance must be achieved, while ensuring correctness and com- pliance with low-level security policies. CAO is a domain speci c language designed to assist development of cryptographic software. An important feature of this language is the design of a novel type system introducing native types such as prede ned sized vectors, matrices and bit strings, residue classes modulo an integer, nite elds and nite eld extensions, allowing for extensive static validation of source code. We present the formalisation, validation and implementation of this type system

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertation presented to obtain the Ph.D degree in Neuroscience Instituto de Tecnologia Química e Biológica, Universidade Nova de Lisboa

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maintaining a high level of data security with a low impact on system performance is more challenging in wireless multimedia applications. Protocols that are used for wireless local area network (WLAN) security are known to significantly degrade performance. In this paper, we propose an enhanced security system for a WLAN. Our new design aims to decrease the processing delay and increase both the speed and throughput of the system, thereby making it more efficient for multimedia applications. Our design is based on the idea of offloading computationally intensive encryption and authentication services to the end systems’ CPUs. The security operations are performed by the hosts’ central processor (which is usually a powerful processor) before delivering the data to a wireless card (which usually has a low-performance processor). By adopting this design, we show that both the delay and the jitter are significantly reduced. At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology. Furthermore, we use enhanced techniques to implement the Counter (CTR) Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) and the CTR protocol. Our experiments show that it requires timing in the range of 20–40 μs to perform data encryption and authentication on different end-host CPUs (e.g., Intel Core i5, i7, and AMD 6-Core) as compared with 10–50 ms when performed using the wireless card. Furthermore, when compared with the standard WiFi protected access II (WPA2), results show that our proposed security system improved the speed to up to 3.7 times.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação para obtenção do Grau de Mestre em Engenharia Informática

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We provide some guidelines for deriving new projective hash families of cryptographic interest. Our main building blocks are so called group action systems; we explore what properties of this mathematical primitives may lead to the construction of cryptographically useful projective hash families. We point out different directions towards new constructions, deviating from known proposals arising from Cramer and Shoup's seminal work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently there has been a great deal of work on noncommutative algebraic cryptography. This involves the use of noncommutative algebraic objects as the platforms for encryption systems. Most of this work, such as the Anshel-Anshel-Goldfeld scheme, the Ko-Lee scheme and the Baumslag-Fine-Xu Modular group scheme use nonabelian groups as the basic algebraic object. Some of these encryption methods have been successful and some have been broken. It has been suggested that at this point further pure group theoretic research, with an eye towards cryptographic applications, is necessary.In the present study we attempt to extend the class of noncommutative algebraic objects to be used in cryptography. In particular we explore several different methods to use a formal power series ring R && x1; :::; xn && in noncommuting variables x1; :::; xn as a base to develop cryptosystems. Although R can be any ring we have in mind formal power series rings over the rationals Q. We use in particular a result of Magnus that a finitely generated free group F has a faithful representation in a quotient of the formal power series ring in noncommuting variables.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El present projecte de fi de carrera té com a objectiu principal el desenvolupament d’un servei criptogràfic per a la plataforma JADE, perquè es puguin implementar agents mòbils autoprotegits. Aquest objectiu s’ha aconseguit dotant les plataformes amb un parell de claus asimètriques i facilitant a l’agent funcions que utilitzen la clau privada de la plataforma entre un gran ventall de funcions criptogràfiques diferents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Past multisensory experiences can influence current unisensory processing and memory performance. Repeated images are better discriminated if initially presented as auditory-visual pairs, rather than only visually. An experience's context thus plays a role in how well repetitions of certain aspects are later recognized. Here, we investigated factors during the initial multisensory experience that are essential for generating improved memory performance. Subjects discriminated repeated versus initial image presentations intermixed within a continuous recognition task. Half of initial presentations were multisensory, and all repetitions were only visual. Experiment 1 examined whether purely episodic multisensory information suffices for enhancing later discrimination performance by pairing visual objects with either tones or vibrations. We could therefore also assess whether effects can be elicited with different sensory pairings. Experiment 2 examined semantic context by manipulating the congruence between auditory and visual object stimuli within blocks of trials. Relative to images only encountered visually, accuracy in discriminating image repetitions was significantly impaired by auditory-visual, yet unaffected by somatosensory-visual multisensory memory traces. By contrast, this accuracy was selectively enhanced for visual stimuli with semantically congruent multisensory pasts and unchanged for those with semantically incongruent multisensory pasts. The collective results reveal opposing effects of purely episodic versus semantic information from auditory-visual multisensory events. Nonetheless, both types of multisensory memory traces are accessible for processing incoming stimuli and indeed result in distinct visual object processing, leading to either impaired or enhanced performance relative to unisensory memory traces. We discuss these results as supporting a model of object-based multisensory interactions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the tremendous amount of data collected in the field of ambulatory care, political authorities still lack synthetic indicators to provide them with a global view of health services utilization and costs related to various types of diseases. Moreover, public health indicators fail to provide useful information for physicians' accountability purposes. The approach is based on the Swiss context, which is characterized by the greatest frequency of medical visits in Europe, the highest rate of growth for care expenditure, poor public information but a lot of structured data (new fee system introduced in 2004). The proposed conceptual framework is universal and based on descriptors of six entities: general population, people with poor health, patients, services, resources and effects. We show that most conceptual shortcomings can be overcome and that the proposed indicators can be achieved without threatening privacy protection, using modern cryptographic techniques. Twelve indicators are suggested for the surveillance of the ambulatory care system, almost all based on routinely available data: morbidity, accessibility, relevancy, adequacy, productivity, efficacy (from the points of view of the population, people with poor health, and patients), effectiveness, efficiency, health services coverage and financing. The additional costs of this surveillance system should not exceed Euro 2 million per year (Euro 0.3 per capita).