938 resultados para Cryptographic key
Resumo:
Research related to carbon geochemistry and biogeochemistry in the East China Sea is reviewed in this paper. The East China Sea is an annual net sink for atmospheric CO, and a large net source of dissolved inorganic carbon to the ocean. The sea absorbs CO, from the atmosphere in spring and summer and releases it in autumn and winter. The East China Sea is a CO, sink in summer because Changjiang River freshwater flows into it. The net average sea-air interface carbon flux of the East China Sea is estimated to be about 4.3 X 10(6) t/y. Vertical carbon transport is mainly in the form of particulate organic carbon in spring; more than 98% of total carbon is transported in this form in surface water, and the number exceeds 68% in water near the bottom. In the southern East China Sea, the average particulate organic carbon inventory was about one-tenth that of the dissolved organic carbon. Research indicates that the southern Okinawa Trough is an important site for particulate organic carbon export from the shelf. The annual cross-shelf exports are estimated to be 414 and 106 Gmol/y for dissolved organic carbon and particulate organic carbon, respectively. Near-bottom transport could be the key process for shelf-to-deep sea export of biogenic and lithogenic particles.
Resumo:
During routine identification of the grasshoppers of the Dasa river, Guizhou Province of China in 2004, a new species [ Oxya guizhouensis sp, nov.] of the genus Oxya Serville ( Orthoptera, Acrididae, Catantopinae) was discovered. It is described here. A key to all known species of the genus from China is given. The type specimens are deposited in the Museum of Hebei University (MHU), Baoding, Hebei, China.
Resumo:
A new species, Atractomorpha taiwanensis sp. n. from Taiwan, China, is described in this paper. The new species is similar to A. micropenna Zheng, 1992, but it differs from the latter by the following: lateral lobe of pronotum without membranous area near posterior margin; the tegmina strongly shortened, not reaching ( in male) the midpoint of hind femur; and wings very small, not reaching the midpoint of tegmina. A key to all known species of the genus Atractomorpha from China is given. The type specimens are deposited in the Museum of Hebei University, China.
Resumo:
A new species Bryodema nigrofrascia of the genus Bryodema Fieber, 1853 (Orthoptera, Acridoidea, Acrididae Oedipodinae) from China is described. A key to known species of the genus is given. The type specimens are deposited in the Northwest Plateau Institute of Biology, Chinese Academy of Sciences, Xining, Qinghai.
Resumo:
The dream of pervasive computing is slowly becoming a reality. A number of projects around the world are constantly contributing ideas and solutions that are bound to change the way we interact with our environments and with one another. An essential component of the future is a software infrastructure that is capable of supporting interactions on scales ranging from a single physical space to intercontinental collaborations. Such infrastructure must help applications adapt to very diverse environments and must protect people's privacy and respect their personal preferences. In this paper we indicate a number of limitations present in the software infrastructures proposed so far (including our previous work). We then describe the framework for building an infrastructure that satisfies the abovementioned criteria. This framework hinges on the concepts of delegation, arbitration and high-level service discovery. Components of our own implementation of such an infrastructure are presented.
Resumo:
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed solutions are not adapted to the IoT and its strong processing, storage, and energy constraints. In this context, we introduce a novel decentralized and batch-based group key management protocol to secure multicast communications. Our protocol is simple and it reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy. To assess our protocol, we conduct a detailed analysis with respect to its communcation and storage costs. This analysis is validated through simulation to highlight energy gains. The obtained results show that our protocol outperforms its peers with respect to keying overhead and the mobility of members.
Resumo:
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. Surprisingly, this is possible even after the adversary has inconspicuously learned (exposed) some-or even all-the secrets in the system. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger. But at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants and prove their optimality. Achieving the strongest tamper evidence turns out to be provably expensive. However, we define a somewhat weaker, but still practical, variant: α-synchronous tamper-evidence (α-te) and provide α-te schemes with logarithmic cost. Our α-te schemes use a combinatorial construction of α-separating sets, which might be of independent interest. We stress that our mechanisms are purely cryptographic: the tamper-detection algorithm Div is stateless and takes no inputs except the two signatures (in particular, it keeps no logs), we use no infrastructure (or other ways to conceal additional secrets), and we use no hardware properties (except those implied by the standard cryptographic assumptions, such as random number generators). Our constructions are based on arbitrary ordinary signature schemes and do not require random oracles.
Resumo:
Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated.
Resumo:
The aim of this study is to garner comparative insights so as to aid the development of the discourse on further education (FE) conceptualisation and the relationship of FE with educational disadvantage and employability. This aim is particularly relevant in Irish education parlance amidst the historical ambiguity surrounding the functioning of FE. The study sets out to critically engage with the education/employability/economy link (eee link). This involves a critique of issues relevant to participation (which extends beyond student activity alone to social relations generally and the dialogic participation of the disadvantaged), accountability (which extends beyond performance measures alone to encompass equality of condition towards a socially just end) and human capital (which extends to both collective and individual aspects within an educational culture). As a comparative study, there is a strong focus on providing a way of conceptualising and comparatively analysing FE policy internationally. The study strikes a balance between conceptual and practical concerns. A critical comparative policy analysis is the methodology that structures the study which is informed and progressed by a genealogical method to establish the context of each of the jurisdictions of England, the United States and the European Union. Genealogy allows the use of history to diagnose the present rather than explaining how the past has caused the present. The discussion accentuates the power struggles within education policy practice using what Fairclough calls a strategic critique as well as an ideological critique. The comparative nature of the study means that there is a need to be cognizant of the diverse cultural influences on policy deliberation. The study uses the theoretical concept of paradigmatic change to critically analyse the jurisdictions. To aid with the critical analysis, a conceptual framework for legislative functions is developed so as to provide a metalanguage for educational legislation. The specific contribution of the study, while providing a manner for understanding and progressing FE policy development in a globalized Ireland, is to clear the ground for a more well-defined and critically reflexive FE sector to operate and suggests a number of issues for further deliberation.
Resumo:
BACKGROUND: Ganglioside biosynthesis occurs through a multi-enzymatic pathway which at the lactosylceramide step is branched into several biosynthetic series. Lc3 synthase utilizes a variety of galactose-terminated glycolipids as acceptors by establishing a glycosidic bond in the beta-1,3-linkage to GlcNaAc to extend the lacto- and neolacto-series gangliosides. In order to examine the lacto-series ganglioside functions in mice, we used gene knockout technology to generate Lc3 synthase gene B3gnt5-deficient mice by two different strategies and compared the phenotypes of the two null mouse groups with each other and with their wild-type counterparts. RESULTS: B3gnt5 gene knockout mutant mice appeared normal in the embryonic stage and, if they survived delivery, remained normal during early life. However, about 9% developed early-stage growth retardation, 11% died postnatally in less than 2 months, and adults tended to die in 5-15 months, demonstrating splenomegaly and notably enlarged lymph nodes. Without lacto-neolacto series gangliosides, both homozygous and heterozygous mice gradually displayed fur loss or obesity, and breeding mice demonstrated reproductive defects. Furthermore, B3gnt5 gene knockout disrupted the functional integrity of B cells, as manifested by a decrease in B-cell numbers in the spleen, germinal center disappearance, and less efficiency to proliferate in hybridoma fusion. CONCLUSIONS: These novel results demonstrate unequivocally that lacto-neolacto series gangliosides are essential to multiple physiological functions, especially the control of reproductive output, and spleen B-cell abnormality. We also report the generation of anti-IgG response against the lacto-series gangliosides 3'-isoLM1 and 3',6'-isoLD1.
Resumo:
Autobiographical memories of trauma victims are often described as disturbed in two ways. First, the trauma is frequently re-experienced in the form of involuntary, intrusive recollections. Second, the trauma is difficult to recall voluntarily (strategically); important parts may be totally or partially inaccessible-a feature known as dissociative amnesia. These characteristics are often mentioned by PTSD researchers and are included as PTSD symptoms in the DSM-IV-TR (American Psychiatric Association, 2000). In contrast, we show that both involuntary and voluntary recall are enhanced by emotional stress during encoding. We also show that the PTSD symptom in the diagnosis addressing dissociative amnesia, trouble remembering important aspects of the trauma is less well correlated with the remaining PTSD symptoms than the conceptual reversal of having trouble forgetting important aspects of the trauma. Our findings contradict key assumptions that have shaped PTSD research over the last 40 years.
Resumo:
The Centrality of Event Scale (CES) measures the extent to which a traumatic memory forms a central component of personnal identity, a turning point in the life story and a reference point for everyday inferences. In two studies, we show that the CES is positively correlated with severity of PTSD symptoms, even when controlling for measures of anxiety, depression, dissociation and self-consciousness. The findings contradict the widespread view that poor integration of the traumatic memory into one's life story is a main cause of PTSD symptoms. Instead, enhanced integration appears to be a key issue. Copyright © 2006 John Wiley & Sons, Ltd.
Resumo:
Purpose: Clear recommendations on how to guide patients with cancer on home parenteral nutrition (HPN) are lacking as the use of HPN in this population remains a controversial issue. Therefore, the aims of this study were to rank treatment recommendations and main outcome indicators to ensure high-quality care and to indicate differences in care concerning benign versus malignant patients. Methods: Treatment recommendations, identified from published guidelines, were used as a starting point for a two-round Delphi approach. Comments and additional interventions proposed in the first round were reevaluated in the second round. Ordinal logistic regression with SPSS 2.0 was used to identify differences in care concerning benign versus malignant patients. Results: Twenty-seven experts from five European countries completed two Delphi rounds. After the second Delphi round, the top three most important outcome indicators were (1) quality of life (QoL), (2) incidence of hospital readmission and (3) incidence of catheter-related infections. Forty-two interventions were considered as important for quality of care (28/42 based on published guidelines; 14/42 newly suggested by Delphi panel). The topics 'Liver disease' and 'Metabolic bone disease' were considered less important for cancer patients, together with use of infusion pumps (p = 0.004) and monitoring of vitamins and trace elements (p = 0.000). Monitoring of QoL is considered more important for cancer patients (p = 0.03). Conclusion: Using a two-round Delphi approach, we developed a minimal set of 42 interventions that may be used to determine quality of care in HPN patients with malignancies. This set of interventions differs from a similar set developed for benign patients. © 2012 Springer-Verlag Berlin Heidelberg.