882 resultados para message dissemination
Resumo:
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design recommendations to enhance the security of proposals following this general model are given.
Resumo:
This research project examined objective measures of driver behaviour and road users' perceptions on the usefulness and effectiveness of three specific VMS (Variable Message Signs) interventions to improve speeding and headway behaviours. The interventions addressed speeding behaviour alone (intervention 1), headway behaviour alone (intervention 2) and a combination of speeding and headway behaviour (intervention 3). Six VMS were installed along a segment of the Bruce Highway, with a series of three signs for each of the northbound and southbound traffic. Speeds and headway distances were measured with loop detectors installed before and after each VMS. Messages addressing speeding and headway were devised for display on the VMS. A driver could receive a message if they were detected as exceeding the posted speed limit (of 90km/hr) or if the distance to the vehicle in front was less than 2.0s. In addition to the on-road objective measurement of speeding and headway behaviours, the research project elicited self-reported responses to the speeding and headway messages from a sample of drivers via a community-based survey. The survey sought to examine the drivers' beliefs about the effectiveness of the signs and messages, and their views about the role, use, and effectiveness of VMS more generally.
Resumo:
The Second Skin 2012 Workshop Program consisted of a full-day intensive design immersion workshop run on Saturday 14 July 2012, at the QUT Faculty of Creative Industries Fashion Studios at Kelvin Grove Brisbane, Australia, for 30? self-selected high-achieving junior and middle school (year 5-9) students, as part of the Queensland Academies ‘Young Scholars’ Program. Inspired by a scientist researching the impact of sun on skin, and mentored by tertiary fashion design and interior design educators, and six tertiary fashion design and interior design students, the workshop explored science and design-inspired prototype solutions for sun-safety. This action research study aimed to facilitate an acute awareness in young people of the sun safety message (alternative to a scare campaign), the role of design in society and the value of design thinking skills in solving complex challenges, and to inspire the generation of strategies to address a systemic health issue. It also aimed to investigate the value of collaboration between junior and middle school students, tertiary design educators and students and industry professionals in targeting youth sun safety, and inspiring post-secondary pathways and idea generation for education. During the workshop, students developed sketching, making, communication, presentation and collaboration skills to improve their design process, while considering social, cultural and environmental opportunities. Through a series of hands-on collaborative design experiments, participants explored in teams of five, ways in which a ‘second skin’ can mirror elements of our skin – the ability to protect, divide, enclose, stretch, scar, pattern, peel and reveal – inspiring both functional and aesthetic design solutions. Underpinned by the State Library of Queensland Design Minds Website ‘inquire, ideate and implement’ model of design thinking, the experiments culminated in the development of a detailed client brief, the design and fabrication of a fashionable sun safe clothing range and then a team presentation and modelling of prototypes in a fashion parade, viewed also by parents. The final collections were judged by three prominent judges: Louise Baldwin - Executive Manager Public Health QLD Cancer Council, Shane Thompson - Architect and 2012 Queensland Smart Design Fellow, and Leigh Buchanan – Fashion designer and Project Runway Australia finalist. The workshop was filmed for Queensland television program ‘Totally Wild’ for dissemination of the value of design, the Design Minds model and the sun safety message to a wider target youth audience.
Resumo:
Australian and international evidence suggests that, in the work-related driving context, road crashes account for a substantial number of occupational incidents. In the attempt to reduce injury and improve safety, organisations may implement an array of strategies and interventions ranging from policy development and implementation, vehicle selection and incident monitoring through to education and awareness-raising. This conceptual paper discusses aspects relating to the latter collection of interventions and, in particular, the role, and some key considerations with respect to the content and dissemination, of advertising campaigns and educational awareness workshops. In relation to advertising campaigns, this paper discusses how some of the overarching principles associated with advertising in the broader general community road safety strategy also apply within the work-related road safety context. Specifically, advertising campaigns/materials should be viewed as a key component within a dedicated organisational approach to road (driver) safety. This dedicated approach would need to comprise of a number, and varied array, of strategies. In addition, the content of, and medium/s (e.g., posters) by which to deliver such advertising campaigns, cannot be addressed by a one-size-fits all approach but, rather, requires careful consideration of the needs as well as characteristics of specific organisations and their driver fleet. The paper provides a summary of some key considerations when devising an advertising campaign, including the nature of campaign/message content as well as the processes by which to devise and refine such content. In relation to driver education awareness workshops, this paper outlines the key considerations for delivering a series of workshops specifically aimed at occupational driving within the organisational context. A case study approach will be utilised to demonstrate the manner in which educational awareness workshops can compliment successful advertising campaigns promoting safer work related driving through better risk management practice. Research underpinning the development of driver behaviour modification tools incorporated within the workshops will also be discussed along with the mechanisms utilised to encourage improvements in driver monitoring and behaviour. In an effort to assist organisations with their continual search for cost-effective approaches which may, ultimately, contribute to improvements in driver behaviour and safety, the current paper offers some clear and practical suggestions in relation to the development and dissemination of two types of interventions, advertising campaigns and education awareness workshops.
Resumo:
Social media adoption in Australia, which provides the geographic focus for this chapter, has been rapid and substantial (ABC News, 2010) – possibly because of the considerable dispersal of the Australian population across the continent, as well as the significant distance of the country from many of its closest partner nations. Social media can play an important role in strengthening and maintaining interpersonal and professional relationships in spite of such physical distance; in particular, social media services are now well-recognised as important tools for the dissemination of news across many developed nations. Hermida (2010) and Burns (2010) both speak of Twitter as a medium for “ambient news”, for example: always-on, operating as a steady stream in the background and at the edge of users’ conscious perception. Much as ambient music is designed to do, it comes to the fore when notable events (such as major breaking news) lead to an increase in volume and demand a greater level of attention from users.
Resumo:
Previous research has shown that mobile phone use while driving can increase crash risk fourfold while texting results in 23 times greater crash risk for heavy vehicle drivers. However, mobile phone use has changed in recent years with the functional capabilities of smart phones to now also include a range of other common behaviours while driving such as using Facebook, emailing, the use of ‘apps’, and GPS. Research continues to show performance decrements for many such behaviours while driving, however many Australians still openly admit to illegal mobile phone use while driving despite ongoing enforcement efforts and public awareness campaigns. Of most concern are young drivers. ‘Apps’ available to restrict mobile phone use while in motion do not prevent use while a driver is stopped at traffic lights, so are therefore not a wholly viable solution. Vehicle manufacturers continue to develop in-vehicle technology to minimise distraction, however communication with the ‘outside world’ while driving is also perhaps a strong selling point for vehicles. Hence, the safety message that drivers should focus on the driving task solely and not use communication devices is unlikely to ever be internalised by many drivers. This paper reviews the available literature on the topic and argues that a better understanding of perceptions of mobile phone use while driving and motives for use are required to inform public awareness campaign development for specific road user groups. Additionally, illegal phone use while driving may be reinforced by not being apprehended (punishment avoidance), therefore stronger deterrence-focussed messages may also be beneficial.
Resumo:
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
Resumo:
The most effective countermeasures to driver sleepiness (caffeine and a nap, ideally in combination) are not the most popular choice for UK drivers. Groups susceptible to driver sleepiness (OSA patients and truck drivers) do not favour effective countermeasures to driver sleepiness. Prior experience of driver sleepiness does not promote an effective choice of countermeasure.
Resumo:
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many important cryptographic problems, and at the same time offer substantial efficiency advantage over ordinary digital signature schemes like RSA. Multiple-time signature schemes have found numerous applications, in ordinary, on-line/off-line, forward-secure signatures, and multicast/stream authentication. We propose a multiple-time signature scheme with very efficient signing and verifying. Our construction is based on a combination of one-way functions and cover-free families, and it is secure against the adaptive chosen-message attack.
Resumo:
In this paper, we propose a new steganalytic method to detect the message hidden in a black and white image using the steganographic technique developed by Liang, Wang and Zhang. Our detection method estimates the length of hidden message embedded in a binary image. Although the hidden message embedded is visually imperceptible, it changes some image statistic (such as inter-pixels correlation). Based on this observation, we first derive the 512 patterns histogram from the boundary pixels as the distinguishing statistic, then we compute the histogram difference to determine the changes of the 512 patterns histogram induced by the embedding operation. Finally we propose histogram quotient to estimate the length of the embedded message. Experimental results confirm that the proposed method can effectively and reliably detect the length of the embedded message.
Resumo:
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.
Resumo:
Salons became popular in Europe in 17th Century as sites of philosophic and literary conversation. A group of female academics interested in Deleuzian theories experimented with the salon to challenge presentation and dissemination norms that hierarchize and centralize the human. For Deleuze and Guattari (1987), assemblages are shifting and decentering, so how might assemblages of chairs, tables, bodies, lights, space, help to trouble thinking about the methodological conventions around academic disseminations? The authors discuss the salon as a critical-cultural site: Cumming presents Deleuze and play-dough, an exploration of how the playful dissemination format of the salon prompted a re-reading of a methodological vignette from earlier research. Knight, an arts-based researcher, uses video art as a creative methodology to examine conceptualizations of rhizomes and assemblages at the salon as a dissemination site. The authors conclude that the salon, as a critical, cultural site disrupts hierarchized ways of approaching and presenting research.
Resumo:
Escherichia coli sequence type 131 (ST131) is a globally disseminated, multidrug resistant (MDR) clone responsible for a high proportion of urinary tract and bloodstream infections. The rapid emergence and successful spread of E. coli ST131 is strongly associated with several factors, including resistance to fluoroquinolones, high virulence gene content, the possession of the type 1 fimbriae FimH30 allele, and the production of the CTX-M-15 extended spectrum β-lactamase (ESBL). Here, we used genome sequencing to examine the molecular epidemiology of a collection of E. coli ST131 strains isolated from six distinct geographical locations across the world spanning 2000–2011. The global phylogeny of E. coli ST131, determined from whole-genome sequence data, revealed a single lineage of E. coli ST131 distinct from other extraintestinal E. coli strains within the B2 phylogroup. Three closely related E. coli ST131 sublineages were identified, with little association to geographic origin. The majority of single-nucleotide variants associated with each of the sublineages were due to recombination in regions adjacent to mobile genetic elements (MGEs). The most prevalent sublineage of ST131 strains was characterized by fluoroquinolone resistance, and a distinct virulence factor and MGE profile. Four different variants of the CTX-M ESBL–resistance gene were identified in our ST131 strains, with acquisition of CTX-M-15 representing a defining feature of a discrete but geographically dispersed ST131 sublineage. This study confirms the global dispersal of a single E. coli ST131 clone and demonstrates the role of MGEs and recombination in the evolution of this important MDR pathogen.
Resumo:
Background Breastfeeding is recognised as the optimal method for feeding infants with health gains made by reducing infectious diseases in infancy; and chronic diseases, including obesity, in childhood, adolescence and adulthood. Despite this, exclusivity and duration in developed countries remains resistant to improvement. The objectives of this research were to test if an automated mobile phone text messaging intervention, delivering one text message a week, could increase “any” breastfeeding rates and improve breastfeeding self-efficacy and coping. Methods Women were eligible to participate if they were: over eighteen years; had an infant less than three months old; were currently breastfeeding; no diagnosed mental illness; and used a mobile phone . Women in the intervention group received MumBubConnect, a text messaging service with automated responses delivered once a week for 8 weeks. Women in the comparison group received their usual care and were sampled two years after the intervention group. Data collection included online surveys at two time points, week zero and week nine, to measure breastfeeding exclusivity and duration, coping, emotions, accountability and self-efficacy. A range of statistical analyses were used to test for differences between groups. Hierarchical regression was used to investigate change in breastfeeding outcome, between groups, adjusting for co-variates. Results The intervention group had 120 participants at commencement and 114 at completion, the comparison group had 114 participants at commencement and 86 at completion. MumBubConnect had a positive impact on the primary outcome of breastfeeding behaviors with women receiving the intervention more likely to continue exclusive breastfeeding; with a 6% decrease in exclusive breastfeeding in the intervention group, compared to a 14% decrease in the comparison group (p < 0.001). This remained significant after controlling for infant age, mother’s income, education and delivery type (p = 0.04). Women in the intervention group demonstrated active coping and were less likely to display emotions-focussed coping (p < .001). There was no discernible statistical effect on self-efficacy or accountability. Conclusions A fully automated text messaging services appears to improve exclusive breastfeeding duration. The service provides a well-accepted, personalised support service that empowers women to actively resolve breastfeeding issues. Trial registration Australian New Zealand Clinical Trials Registry: ACTRN12614001091695.