876 resultados para Exchange.
Resumo:
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the secrecy of past keys, violating the secrecy of the confidential channel. Quantum key distribution (QKD) can be used generate secret keys that are secure against any future algorithmic or computational improvements. QKD protocols still require authentication of classical communication, although existing security proofs of QKD typically assume idealized authentication. It is generally considered folklore that QKD when used with computationally secure authentication is still secure against an unbounded adversary, provided the adversary did not break the authentication during the run of the protocol. We describe a security model for quantum key distribution extending classical authenticated key exchange (AKE) security models. Using our model, we characterize the long-term security of the BB84 QKD protocol with computationally secure authentication against an eventually unbounded adversary. By basing our model on traditional AKE models, we can more readily compare the relative merits of various forms of QKD and existing classical AKE protocols. This comparison illustrates in which types of adversarial environments different quantum and classical key agreement protocols can be secure.
Resumo:
While prior research has addressed how collective workplace outcomes are negotiated between employers and trade unions, less attention has been afforded to the ‘everyday’, micro-level exchanges between managers and employees in adjusting work, alongside the ‘standard’ terms and conditions set out in employment contracts. Building on previous work on idiosyncratic deals and requests for flexible scheduling, this article presents the findings from a survey of Australian parents which addressed manager-employee exchanges which led to customized work arrangements. The survey examined the frequency with which various employment terms and conditions were negotiated, who initiated the interactions, where they occurred, and the extent of perceived compromise. The study revealed that manager-employee exchanges occur frequently in the context of roles in nuclear and extended families, and are influenced by the parameters around which formal childcare and educational settings function. Women rated the exchanges as more important than men, but men and women were similarly comfortable with the interactions and satisfied with outcomes. The findings have important implications for managers and organizations in terms of balancing the goals of efficiency with employees’ preferences for workplace flexibility and other terms beyond those which are standardized.
Resumo:
The purpose of this article is to describe a project with one Torres Strait Islander Community. It provides some insights into parents’ funds of knowledge that are mathematical in nature, such as sorting shells and giving fish. The idea of funds of knowledge is based the premise that people are competent and have knowledge that has been historically and culturally accumulated into a body of knowledge and skills essential for their functioning and well-being. This knowledge is then practised throughout their lives and passed onto the next generation of children. Through using a community research approach, funds of knowledge that can be used to validate the community’s identities as knowledgeable people, can be used as foundations for future learnings for teachers, parents and children in the early years of school. They can be the bridge that joins a community’s funds of knowledge with schools validating that knowledge.
Resumo:
Experiments were carried out on the sodium hypochlorite bleach sensitivity of a deep subsurface andesitic reservoir in order to predict possible deleterious mineral transformations during a downhole clean-up job. Experiments involved examination of core samples from the reservoir using an Environmental Scanning Electron Microscope (ESEM) with an attached Energy Dispersive Spectrometer (EDS) before and after the samples were immersed in bleach. Bleach immersion of whole-rock samples resulted in rapid (less than 1 min) precipitation of abundant 3.0-10.0-μm-wide calcite rhombs within clay-associated micropores and on clay and feldspar grain surfaces. Abundant microporefilling calcite rhombs also formed in pure separates of constituent chlorite/corrensite, whereas no calcite formed in a pure separate of constituent zeolite. These experiments indicate that corrensite is the likely calcium source in this experimental fluid-rock system. Formation of calcite occurs via a cation exchange reaction in which calcium in the smectitic interlayers of corrensite exchanges for sodium in the bleach. Serious formation damage due to calcite precipitation would have occurred in the andesite reservoir had it been exposed to bleach. This finding gives credence to earlier suggestions that cation exchange reactions have the potential to cause calcite precipitation in some sandstone reservoirs when exposed to drilling, completion or stimulation fluids. © 1993.
Resumo:
J.W.Lindt’s Colonial man and Aborigine image from the GRAFTON ALBUM: “On chemistry and optics all does not depend, art must with these in triple union blend” (text from J.W. Lindt’s photographic backing card) In this paper, I follow an argument that Lindt held a position in his particular colonial environment where he was simultaneously both an insider and an outsider and that such a position may be considered prerequisite in stimulating exchange. A study of the transition of J.W. Lindt in Grafton, N.S.W. in the 1860s from a traveller to a migrant and subsequently to a professional photographer, as well as Lindt’s photographic career, which evolved through strategic action and technical approaches to photography, bears witness to his cultural relativity. One untitled photograph from this period of work constructs a unique commentary of Australian colonial life that illustrates a non-hegemonic position, particularly as it was included in one of the first albums of photographs of Aborigines that Lindt gifted to an illustrious person (in this case the Mayor of Grafton). As in his other studio constructions, props and backdrops were arranged and sitters were positioned with care, but this photograph is the only one in the album that includes a non-Aborigine in a relationship to an Aborigine. An analysis of the props, technical details of the album and the image suggests a reconciliatory aspect that thwarts the predominant attitudes towards Aborigines in the area at that time.
Resumo:
We investigate the claims of superiority of fundamental indexation strategy over capitalisation-weighted indexation by using data for Australian Securities Exchange (ASX) listed stocks. Whilst our results are in line with the outperformance observed in other geographical markets, we find that the excess returns from fundamental indexation in Australian market are much higher. On a rolling 5-year basis, the fundamental index always outperforms the capitalisation-weighted index. Our results suggest that superior performance of fundamental indexation could not be entirely attributed to value, size, or momentum effects. The outperformance persists even after adjusting for slightly higher transaction costs related to turnover.
Resumo:
In this submission, we provide evidence for our view that copyright policy in the UK must encourage new digital business models which meet the changing needs of consumers and foster innovation in the UK both within, and beyond, the creative industries. We illustrate our arguments using evidence from the music industry. However, we believe that our key points on the relationship between the copyright system and innovative digital business models apply across the UK creative industries.
Resumo:
Heteroatom doping on the edge of graphene may serve as an effective way to tune chemical activity of carbon-based electrodes with respect to charge carrier transfer in an aqueous environment. In a step towards developing mechanistic understanding of this phenomenon, we explore herein mechanisms of proton transfer from aqueous solution to pristine and doped graphene edges utilizing density functional theory. Atomic B-, N-, and O- doped edges as well as the native graphene are examined, displaying varying proton affinities and effective interaction ranges with the H3O+ charge carrier. Our study shows that the doped edges characterized by more dispersive orbitals, namely boron and nitrogen, demonstrate more energetically favourable charge carrier exchange compared with oxygen, which features more localized orbitals. Extended calculations are carried out to examine proton transfer from the hydronium ion in the presence of explicit water, with results indicating that the basic mechanistic features of the simpler model are unchanged.
Resumo:
The Guide includes research findings from the Australian Centre for Philanthropy and Non Profit Studies at the Queensland University of Technology (QUT). This research probed the experiences of fourteen Indigenous people who have had different degrees of success in seeking funding from philanthropic organisations. This research shows how grantmakers can make a significant difference in the lives of Aboriginal and Torres Strait Islander people.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
This study was conducted within the context of a flexible education institution where conventional educational assessment practices and tests fail to recognise and assess the creativity and cultural capital of a cohort of marginalised young people. A new assessment model which included an electronic-portfolio-social-networking system (EPS) was developed and trialled to identify and exhibit evidence of students' learning. The study aimed to discern unique forms of cultural capital (Bourdieu, 1986) possessed by students who attend the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN). The EPS was trialled at the case study schools in an intervention and developed a space where students could make evident culturally specific forms of capital and funds of knowledge (Gonzalez, Moll, & Amanti, 2005). These resources were evaluated, modified and developed through dialogic processes utilising assessment for learning approaches (Qualifications and Curriculum Development Agency, 2009) in online and classroom settings. Students, peers and staff engaged in the recognition, judgement, revision and evaluation of students' cultural capital in a subfield of exchange (Bourdieu, 1990). The study developed the theory of assessment for learning as a field of exchange incorporating an online system as a teaching and assessment model. The term efield has been coined to describe this particular capital exchange model. A quasi-ethnographic approach was used to develop a collective case study (Stake, 1995). This case study involved an in-depth exploration of five students' forms of cultural capital and the ways in which this capital could be assessed and exchanged using the efield model. A comparative analysis of the five cases was conducted to identify the emergent issues of students' recognisable cultural capital resources and the processes of exchange that can be facilitated to acquire legitimate credentials for these students in the Australian field of education. The participants in the study were young people at two EREAFLC schools aged between 12 and 18 years. Data was collected through interviews, observations and examination of documents made available by the EREAFLCN. The data was coded and analysed using a theoretical framework based on Bourdieu's analytical tools and a sociocultural psychology theoretical perspective. Findings suggest that processes based on dialogic relationships can identify and recognise students' forms of cultural capital that are frequently misrecognised in mainstream school environments. The theory of assessment for learning as a field of exchange was developed into praxis and integrated in an intervention. The efield model was found to be an effective sociocultural tool in converting and exchanging students' capital resources for legitimated cultural and symbolic capital in the field of education.
Resumo:
Road traffic injuries are one of the major public health burdens worldwide. The United Nations Decade of Action for Road Safety (2011-2020) implores all nations to work to reduce this burden. This decade represents a unique and historic period of time in the field of road safety. Information exchange and co-operation between nations is an important step in achieving the goal. The burden of road crashes, fatalities and injuries is not equally distributed. We know that low and middle-income countries experience the majority of the road trauma burden. Therefore it is imperative that these countries learn from the successes of others that have developed and implemented road safety laws, public education campaigns and countermeasures over many years and have achieved significant road trauma reductions as a result. China is one of the countries experiencing a large road trauma burden. Vulnerable road users such as pedestrians and cyclists make up a large proportion of fatalities and injuries in China. Speeding, impaired/drug driving, distracted driving, vehicle overloading, inadequate road infrastructure, limited use of safety restraints and helmets, and limited road safety training have all been identified as contributing to the problem. Some important steps have been taken to strengthen China’s approach, including increased penalties for drunk driving in May 2011 and increased attention to school bus safety in 2011/12. However, there is still a large amount of work needed to improve the current road safety position in China. This paper provides details of a program to assist with road safety knowledge exchange between China and Australia that was funded by the Australian Government which was undertaken in the latter part of 2012. The four month program provided the opportunity for the first author to work closely with key agencies in Australia that are responsible for policy development and implementation of a broad range of road safety initiatives. In doing so, an in-depth understanding was gained about key road safety strategies in Australia and processes for developing and implementing them. Insights were also gained into the mechanisms used for road safety policy development, implementation and evaluation in several Australian jurisdictions. Road traffic law and enforcement issues were explored with the relevant jurisdictional transport and police agencies to provide a greater understanding of how Chinese laws and practices could be enhanced. Working with agencies responsible for public education and awareness campaigns about road safety in Australia also provided relevant information about how to promote road safety at the broader community level in China. Finally, the program provided opportunities to work closely with several world-renowned Australian research centres and key expert researchers to enhance opportunities for ongoing road safety research in China. The overall program provided the opportunity for the first author to develop knowledge in key areas of road safety strategy development, implementation and management which are directly relevant to the current situation in China. This paper describes some main observations and findings from participation in the program.