971 resultados para security protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Different protocols of food deprivation were used to bring two groups of juvenile three-spined sticklebacks Gaslerosteus aculeatus to the same reduced body mass in comparison with a control group fed daily ad libitum. One group experienced I week or deprivation then 2 weeks on maintenance rations. The second group experienced I week of ad lithium feeding followed by 2 weeks of deprivation. The deprived groups were reduced to a mean mass ore. 80% of controls. The compensatory growth response shown when ad libitum feeding was resumed was independent of the trajectory by which the three-spined sticklebacks had reached the reduced body mass. The compensatory response was Sufficient to return the deprived groups to the mass and length trajectories shown by the control group within 4 weeks. There was full compensation for dry mass and total lipid, but incomplete compensation for lipid-free dry mass. Hyperphagia and increased growth efficiency were present in the re-feeding phase, but there was a lag of a week before the hyperphagia was established. The consistency of the compensatory response of immature three-spined sticklebacks provides a potential model system for the analysis and prediction of appetite and growth in teleosts. (C) 2003 The Fisheries Society of the British isles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The compensatory growth responses of individual juveniles of two co-existing species were compared after identical periods of starvation to determine inter-specific similarities and differences. The carnivorous stickleback Gasterosteus aculeatus was compared with the omnivorous minnow Phoxinus phoxinus. Both species experienced 1 or 2 weeks of starvation before being re-fed ad libitum. The two species differed in their response to the starvation periods, with minnows showing a lower weight-specific loss. Both species showed compensatory responses in appetite, growth and to a lesser extent, growth efficiency. Minnows wholly compensated for 1 and 2 weeks of starvation. At the end of the experiment, sticklebacks starved For 2 weeks were still showing a compensatory response and had nut achieved full compensation. The compensatory responses of the sticklebacks showed a lag of a week before developing in the re-feeding phase, whereas the response of the minnows was immediate. Analysis of lipid and dry matter concentrations suggested that the compensatory response restored reserve lipids while also bringing the fish back to the growth trajectory of continuously fed fish. (C) 2001 The Fisheries Society of the British Isles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a layered architecture for secure e-commerce applications and protocols with fully automated dispute-resolution process, robust to communication failures and malicious faults. Our design is modular, with precise yet general-purpose interfaces and functionalities, and allows usage as an underlying secure service to different e-commerce, e-banking and other distributed systems. The interfaces support diverse, flexible and extensible payment scenarios and instruments, including direct buyer-seller payments as well as (the more common) indirect payments via payment service providers (e.g. banks). Our design is practical, efficient, and ensures reliability and security under realistic failure and delay conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e; (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

1998年,Guttman等人提出了串空间理论作为一种新的密码协议形式化分析的工具.并在1999年第1次引入了关于消息代数上的理想以及诚实的概念来分析协议的保密性.由于理想结构的特殊性使得它可以刻画协议运行中消息之间的关系,利用理想的结构来分析协议的一些安全性质,例如保密性、认证性、零知识性以及如何抵抗猜测攻击.

Relevância:

20.00% 20.00%

Publicador: