923 resultados para Key Block Theory
Resumo:
Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.
Resumo:
The purpose of this study is to investigate how secondary school media educators might best meet the needs of students who prefer practical production work to ‘theory’ work in media studies classrooms. This is a significant problem for a curriculum area that claims to develop students’ media literacies by providing them with critical frameworks and a metalanguage for thinking about the media. It is a problem that seems to have become more urgent with the availability of new media technologies and forms like video games. The study is located in the field of media education, which tends to draw on structuralist understandings of the relationships between young people and media and suggests that students can be empowered to resist media’s persuasive discourses. Recent theoretical developments suggest too little emphasis has been placed on the participatory aspects of young people playing with, creating and gaining pleasure from media. This study contributes to this ‘participatory’ approach by bringing post structuralist perspectives to the field, which have been absent from studies of secondary school media education. I suggest theories of media learning must take account of the ongoing formation of students’ subjectivities as they negotiate social, cultural and educational norms. Michel Foucault’s theory of ‘technologies of the self’ and Judith Butler’s theories of performativity and recognition are used to develop an argument that media learning occurs in the context of students negotiating various ‘ethical systems’ as they establish their social viability through achieving recognition within communities of practice. The concept of ‘ethical systems’ has been developed for this study by drawing on Foucault’s theories of discourse and ‘truth regimes’ and Butler’s updating of Althusser’s theory of interpellation. This post structuralist approach makes it possible to investigate the ways in which students productively repeat and vary norms to creatively ‘do’ and ‘undo’ the various media learning activities with which they are required to engage. The study focuses on a group of year ten students in an all boys’ Catholic urban school in Australia who undertook learning about video games in a three-week intensive ‘immersion’ program. The analysis examines the ethical systems operating in the classroom, including formal systems of schooling, informal systems of popular cultural practice and systems of masculinity. It also examines the students’ use of semiotic resources to repeat and/or vary norms while reflecting on, discussing, designing and producing video games. The key findings of the study are that students are motivated to learn technology skills and production processes rather than ‘theory’ work. This motivation stems from the students’ desire to become recognisable in communities of technological and masculine practice. However, student agency is not only possible through critical responses to media, but through performative variation of norms through creative ethical practices as students participate with new media technologies. Therefore, the opportunities exist for media educators to create the conditions for variation of norms through production activities. The study offers several implications for media education theory and practice including: the productive possibilities of post structuralism for informing ways of doing media education; the importance of media teachers having the autonomy to creatively plan curriculum; the advantages of media and technology teachers collaborating to draw on a broad range of resources to develop curriculum; the benefits of placing more emphasis on students’ creative uses of media; and the advantages of blending formal classroom approaches to media education with less formal out of school experiences.
Resumo:
This chapter will address psychodynamic, cognitive-behavioural, and developmental models in supervision by initially considering the historical underpinnings of each and then examining in turn some of the key processes that are evident in the supervisory relationships. Case studies are included where appropriate to highlight the application of theory to practice and several processes are fully elaborated over all models to enable a contemporary view of style and substance in the supervision context.
Resumo:
This paper argues that media and communications theory, as with cultural and creative industries analysis, can benefit from a deeper understanding of economic growth theory. Economic growth theory is elucidated in the context of both cultural and media studies and with respect to modern Chinese economic development. Economic growth is a complex evolutionary process that is tightly integrated with socio-cultural and political processes. This paper seeks to explore this mechanism and to advance cultural theory from an erstwhile political economy perspective to one centred about the co-evolutionary dynamics of economic and socio-political systems. A generic model is presented in which economic and social systems co-evolve through the origination, adoption and retention of new ideas, and in which the creative industries are a key part of this process. The paper concludes that digital media capabilities are a primary source of economic development.
Resumo:
With the increasing growth of cultural events both in Australia and internationally, there has also been an increase in event management studies; in theory and in practice. Although a series of related knowledge and skills required specifically by event managers has already been identified by many researchers (Perry et al., 1996; Getz, 2002 & Silvers et al., 2006) and generic event management models proposed, including ‘project management’ strategies in an event context (Getz, 2007), knowledge gaps still exist in relation to identifying specific types of events, especially for not-for-profit arts events. For events of a largely voluntary nature, insufficient resources are recognised as the most challenging; including finance, human resources and infrastructure. Therefore, the concepts and principles which are adopted by large scale commercial events may not be suitable for not-for-profit arts events aiming at providing professional network opportunities for artists. Building partnerships are identified as a key strategy in developing an effective event management model for this type of event. Using the 2008 World Dance Alliance Global Summit (WDAGS) in Brisbane 13-18 July, as a case study, the level, nature and relationship of key partners are investigated. Data is triangulated from interviews with organisers of the 2008 WDAGS, on-line and email surveys of delegates, participant observation and analysis of formal and informal documents, to produce a management model suited to this kind of event.
Resumo:
Up front I am impelled to acknowledge an intellectual debt to Raewyn Connell as one of my PhD supervisors about 20 years ago and as having a lasting influence on my own sociological approach to research. One of key themes of this book is that southern theorists are rarely read in the northern hemisphere. This is not the case for Connell, however, one of Australia’s most internationally renowned scholars. The tome reads as the creative outpouring of her lifelong thirst for social science. Its main claim is that southern theory ‘has as much intellectual power as metropolitan social thought, and more political relevance’ (p. xii). A big but compelling claim, as I will explain.
Resumo:
This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.
Resumo:
Professional coaching is a rapidly expanding field with interdisciplinary roots and broad application. However, despite abundant prescriptive literature, research into the process of coaching, and especially life coaching, is minimal. Similarly, although learning is inherently recognised in the process of coaching, and coaching is increasingly being recognised as a means of enhancing teaching and learning, the process of learning in coaching is little understood, and learning theory makes up only a small part of the evidence-based coaching literature. In this grounded theory study of life coaches and their clients, the process of learning in life coaching across a range of coaching models is examined and explained. The findings demonstrate how learning in life coaching emerged as a process of discovering, applying and integrating self-knowledge, which culminated in the development of self. This process occurred through eight key coaching processes shared between coaches and clients and combined a multitude of learning theory.
Resumo:
Across Australia, construction and redevelopment of public infrastructure, continues to be a key factor in economic development. Within this context, road transport has been identified as key building block of Queensland‟s future prosperity. However, since the late twentieth century, there has been a shift away from delivery of large infrastructure, including road networks, exclusively by the state. Subsequently, a range of alternative models, have emerged in infrastructure project delivery. Among these, governance networks have become a widespread mechanism for planning and delivering infrastructure. However, despite substantial public investments in road infrastructure that are made through governance networks, little is known about how these networks engage with stakeholders who are potentially affected by road infrastructure projects. Although governance networks undertake management functions, it is unclear what drives stakeholder engagement within this networked environment and how stakeholder relationship management is operationalised. This paper proposes that network management functions undertaken by governance networks incorporate stakeholder engagement and that network managers play a key role in creating and sustaining connections between governance networks and their stakeholders Drawing on stakeholder theory and governance network theory, this paper contributes to the literature by showing that stakeholder engagement is embedded within network management and identifying the critical role of network managers in establishing and maintaining stakeholder engagement.
Resumo:
We investigated the key beliefs to target in interventions aimed at increasing physical activity (PA) among mothers and fathers of young children. Parents (288 mothers and 292 fathers) completed a Theory of Planned Behaviour belief-based questionnaire and a 1-week follow-up of PA behaviour. We found that a range of behavioural, normative, and control beliefs were significantly correlated with parents’ PA intentions and behaviour, with only a few differences observed in correlations between PA beliefs and intention and behaviour by gender. A range of key beliefs was identified as making independent contributions to parents’ PA intentions; however, the behavioural beliefs about improving parenting practices (β = 0.13), interfering with other commitments (β = −0.29); normative beliefs about people I exercise with (β = 0.20); and control beliefs about lack of time (β = −0.24), inconvenience (β = −0.14), lack of motivation (β = −0.34), were revealed as significant independent predictors of actual PA behaviour. Furthermore, we found that a limited amount of parents already hold these beliefs, suggesting that these key beliefs warrant changing and, therefore, are appropriate targets for subsequent intervention. The current study fills an empirical gap in the PA literature by investigating an at-risk group and using a well established theoretical framework to identify key beliefs that guide parents’ PA decision-making. Overall, we found support for parents being a unique group who hold distinctive behavioural, normative, and control beliefs toward PA. Attention to these key underlying beliefs will assist intervention work aimed at combating inactivity among this at-risk population.
Resumo:
We present several new observations on the SMS4 block cipher, and discuss their cryptographic significance. The crucial observation is the existence of fixed points and also of simple linear relationships between the bits of the input and output words for each component of the round functions for some input words. This implies that the non-linear function T of SMS4 does not appear random and that the linear transformation provides poor diffusion. Furthermore, the branch number of the linear transformation in the key scheduling algorithm is shown to be less than optimal. The main security implication of these observations is that the round function is not always non-linear. Due to this linearity, it is possible to reduce the number of effective rounds of SMS4 by four. We also investigate the susceptibility of SMS4 to further cryptanalysis. Finally, we demonstrate a successful differential attack on a slightly modified variant of SMS4. These findings raise serious questions on the security provided by SMS4.
Resumo:
Luxury is a quality that is difficult to define as the historical concept of luxury appears to be both dynamic and culturally specific. The everyday definition explains a ‘luxury’ in relation to a necessity: a luxury (product or service) is defined as something that consumers want rather than need. However, the growth of global markets has seen a boom in what are now referred to as ‘luxury brands’. This branding of products as luxury has resulted in a change in the way consumers understand luxury goods and services. In their attempts to characterize a luxury brand, Fionda & Moore in their article “The anatomy of a Luxury Brand” summarize a range of critical conditions that are in addition to product branding “... including product and design attributes of quality, craftsmanship and innovative, creative and unique products” (Fionda & Moore, 2009). For the purposes of discussing fashion design however, quality and craftsmanship are inseparable while creativity and innovation exist under different conditions. The terms ‘creative’ and ‘innovative’ are often used inter-changeably and are connected with most descriptions of the design process, defining ‘design’ and ‘fashion’ in many cases. Christian Marxt and Fredrik Hacklin identify this condition in their paper “Design, product development, innovation: all the same in the end?”(Marxt & Hacklin, 2005) and suggest that design communities should be aware that the distinction between these terms, whilst once quite definitive, is becoming narrow to a point where they will mean the same thing. In relation to theory building in the discipline this could pose significant problems. Brett Richards (2003) identifies innovation as different from creativity in that innovation aims to transform and implement rather than simply explore and invent. Considering this distinction, in particular relation to luxury branding, may affect the way in which design can contribute to a change in the way luxury fashion goods might be perceived in a polarised fashion market, namely suggesting that ‘luxury’ is what consumers need rather than the ‘pile it high, sell it cheap’ fashion that the current market dynamic would indicate they want. This paper attempts to explore the role of innovation as a key contributing factor in luxury concepts, in particular the relationship between innovation and creativity, the conditions which enable innovation, the role of craftsmanship in innovation and design innovation in relation to luxury fashion products. An argument is presented that technological innovation can be demonstrated as a common factor in the development of luxury fashion product and that the connection between designer and maker will play an important role in the development of luxury fashion goods for a sustainable fashion industry.