940 resultados para SELECTIVE ENCRYPTION


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is a collection of essays that utilises descriptive and empirical tools to examine competitive environments such as in academia, superrich and sport. The essays capture different aspects of the winner-take-all phenomenon by looking at citation and publication inequality in a top tier economics journal namely the American Economic Review. How globalisation and corruption influence the accumulation of extraordinary wealth and finally, how in a fairly equal competition, that is in the National Rugby League in Australia, wearing red shirts could lead to a comparative advantage and hence, tip the balance between winning and losing. The results within academia indicate that a highly unequal distribution exist, in which only a few top authors or institutions produce the majority of output. Furthermore, the results obtained in the superrich environment indicate that corruption and globalisation enhances the accumulation of extraordinary wealth. Finally, the results in the sport environment are mixed. While we find support for a positive effect of wearing red jerseys in our descriptive analysis, we find a negative effect when we control at the team level. However, when we investigate the relative difference in the degree of redness between home and away team, we find a quite strong positive effect of wearing red shirts even after controlling at the team level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Photocatalytic synthesis using visible light is a desirable chemical process because of its potential to utilize sunlight. Supported gold nanoparticles (Au-NPs) were found to be efficient photocatalysts and the effects of the supports were identified including CeO2, TiO2, ZrO2, Al2O3, and zeolite Y. In particular Au/CeO2 exhibited the high catalytic activity to reduce nitroaromatics to azo compounds, hydrogenate azobenzene to hydroazobenzene, reduce ketones to alcohols, and deoxygenate epoxides to alkenes at ambient temperatures, under irradiation of visible light (or simulated sunlight). The reac-tive efficiency depends on two primary factors: one is the light adsorption of catalysts and another is the driving ability of catalysts corresponding to the reactants. The light absorption by Au-NPs is due to surface plasmon resonance effect or inter-band electron transition; this is related to the reduction ability of the photocatalysts. Irradiation with shorter wavelengths can excite the conduction electrons in Au-NPs to higher energy levels and as a result, induce reduction with more negative reduction potentials. It is known when irradiated with light the Au-NPs can abstract hydrogen from isopropanol forming Au-H species on the Au-NP surface. Hence, we proposed that the active Au-H species will react with the N=O, N=N, C=O double bonds or epoxide bonds, which are weakened by the interaction with the excited electrons in the Au-NPs, and yield the final reductive products. The reacting power of the Au-H species depends on the energy of the excited electrons in Au-NPs: the higher the electronic energy, the stronger the reduction ability of the Au-H species. This finding demonstrates that we can tune the reduction ability of the photocatalysts by manipulating the irradiation wavelength.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stimulation of the androgen receptor via bioavailable androgens, including testosterone and testosterone metabolites, is a key driver of prostate development and the early stages of prostate cancer. Androgens are hydrophobic and as such require carrier proteins, including sex hormone-binding globulin (SHBG), to enable efficient distribution from sites of biosynthesis to target tissues. The similarly hydrophobic corticosteroids also require a carrier protein whose affinity for steroid is modulated by proteolysis. However, proteolytic mechanisms regulating the SHBG/androgen complex have not been reported. Here, we show that the cancer-associated serine proteases, kallikrein-related peptidase (KLK)4 and KLK14, bind strongly to SHBG in glutathione S-transferase interaction analyses. Further, we demonstrate that active KLK4 and KLK14 cleave human SHBG at unique sites and in an androgen-dependent manner. KLK4 separated androgen-free SHBG into its two laminin G-like (LG) domains that were subsequently proteolytically stable even after prolonged digestion, whereas a catalytically equivalent amount of KLK14 reduced SHBG to small peptide fragments over the same period. Conversely, proteolysis of 5α-dihydrotestosterone (DHT)-bound SHBG was similar for both KLKs and left the steroid binding LG4 domain intact. Characterization of this proteolysis fragment by [(3)H]-labeled DHT binding assays revealed that it retained identical affinity for androgen compared with full-length SHBG (dissociation constant = 1.92 nM). Consistent with this, both full-length SHBG and SHBG-LG4 significantly increased DHT-mediated transcriptional activity of the androgen receptor compared with DHT delivered without carrier protein. Collectively, these data provide the first evidence that SHBG is a target for proteolysis and demonstrate that a stable fragment derived from proteolysis of steroid-bound SHBG retains binding function in vitro.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vertically-aligned carbon nanotube (VACNT) membranes show very high permeation fluxes due to the inherent smooth and frictionless nature of the interior of the nanotubes. However, the hydrogen selectivities are all in the Knudsen range and are quite low. In this study we grew molecular sieve zeolite imidazolate frameworks (ZIFs) via secondary seeded growth on the VACNT membranes as a gas selective layer. The ZIF layer has a thickness of 5–6 μm and shows good contact with the VACNT membrane surface. The VACNT supported ZIF membrane shows much higher H2 selectivity than Ar (7.0); O2 (13.6); N2 (15.1) and CH4 (9.8). We conclude that tailoring metal–organic frameworks on the membrane surface can be an effective route to improve the gas separation performance of the VACNT membrane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Predicate encryption is a new primitive that supports flexible control over access to encrypted data. We study predicate encryption systems, evaluating a wide class of predicates. Our systems are more expressive than the existing attribute-hiding systems in the sense that the proposed constructions support not only all existing predicate evaluations but also arbitrary conjunctions and disjunctions of comparison and subset queries. Toward our goal, we propose encryption schemes supporting multi-inner-product predicate and provide formal security analysis. We show how to apply the proposed schemes to achieve all those predicate evaluations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The combined techniques of in situ Raman microscopy and scanning electron microscopy (SEM) have been used to study the selective oxidation of methanol to formaldehyde and the ethene epoxidation reaction over polycrystalline silver catalysts. The nature of the oxygen species formed on silver was found to depend critically upon the exact morphology of the catalyst studied. Bands at 640, 780 and 960 cm-1 were identified only on silver catalysts containing a significant proportion of defects. These peaks were assigned to subsurface oxygen species situated in the vicinity of surface dislocations, AgIII=O sites formed on silver atoms modified by the presence of subsurface oxygen and O2 - species stabilized on subsurface oxygen-modified silver sites, respectively. The selective oxidation of methanol to formaldehyde was determined to occur at defect sites, where reaction of methanol with subsurface oxygen initially produced subsurface OH species (451 cm-1) and adsorbed methoxy species. Two distinct forms of adsorbed ethene were identified on oxidised silver sites. One of these was created on silver sites modified by the interaction of subsurface oxygen species, and the other on silver crystal planes containing a surface coverage of atomic oxygen species. The selective oxidation of ethene to ethylene oxide was achieved by the reaction between ethene adsorbed on modified silver sites and electrophilic AgIII=O species, whereas the combustion reaction was perceived to take place by the reaction of adsorbed ethene with nucleophilic surface atomic oxygen species. Defects were determined to play a critical role in the epoxidation reaction, as these sites allowed the rapid diffusion of oxygen into subsurface positions, and consequently facilitated the formation of the catalytically active AgIII=O sites.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a method for optical encryption of information, based on the time-dependent dynamics of writing and erasure of refractive index changes in a bulk lithium niobate medium. Information is written into the photorefractive crystal with a spatially amplitude modulated laser beam which when overexposed significantly degrades the stored data making it unrecognizable. We show that the degradation can be reversed and that a one-to-one relationship exists between the degradation and recovery rates. It is shown that this simple relationship can be used to determine the erasure time required for decrypting the scrambled index patterns. In addition, this method could be used as a straightforward general technique for determining characteristic writing and erasure rates in photorefractive media.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the past ten years, scaled-up utilisation of a previously under-exploited zeolite, Zeolite N1, has been demonstrated for selective ion exchange of ammonium and other ions in aqueous environments. As with many zeolite syntheses, the required source material should contain predictable levels of aluminium and silicon and, for full-scale industrial applications, kaolin and/or montmorillonite serve such a purpose. Field, pilot and commercial scale trials of kaolin-derived Zeolite N have focused on applications in agriculture and water treatment as these sectors are primary producers or users of ammonium. The format for the material – as fine powders, granules or extrudates – depends on the specific application albeit each has been evaluated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unlike the case with other divalent transition metal M\[TCNQ](2)(H(2)O)(2) (M = Fe, Co, Ni) analogues, the electrochemically induced solid-solid phase interconversion of TCNQ microcrystals (TCNQ = 7,7,8,8-tetracyanoquinodimethane) to Mn\[TCNQ](2)(H(2)O)(2) occurs via two voltammetrically distinct, time dependent processes that generate the coordination polymer in nanofiber or rod-like morphologies. Careful manipulation of the voltammetric scan rate, electrolysis time, Mn(2+)((aq)) concentration, and the method of electrode modification with solid TCNQ allows selective generation of either morphology. Detailed ex situ spectroscopic (IR, Raman), scanning electron microscopy (SEM), and X-ray powder diffraction (XRD) characterization clearly establish that differences in the electrochemically synthesized Mn-TCNQ material are confined to morphology. Generation of the nanofiber form is proposed to take place rapidly via formation and reduction of a Mn-stabilized anionic dimer intermediate, \[(Mn(2+))(TCNQ-TCNQ)(2)(*-)], formed as a result of radical-substrate coupling between TCNQ(*-) and neutral TCNQ, accompanied by ingress of Mn(2+) ions from the aqueous solution at the triple phase TCNQ/electrode/electrolyte boundary. In contrast, formation of the nanorod form is much slower and is postulated to arise from disproportionation of the \[(Mn(2+))(TCNQ-TCNQ)(*-)(2)] intermediate. Thus, identification of the time dependent pathways via the solid-solid state electrochemical approach allows the crystal size of the Mn\[TCNQ](2)(H(2)O)(2) material to be tuned and provides new mechanistic insights into the formation of different morphologies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IRE1 couples endoplasmic reticulum unfolded protein load to RNA cleavage events that culminate in the sequence-specific splicing of the Xbp1 mRNA and in the regulated degradation of diverse membrane-bound mRNAs. We report on the identification of a small molecule inhibitor that attains its selectivity by forming an unusually stable Schiff base with lysine 907 in the IRE1 endonuclease domain, explained by solvent inaccessibility of the imine bond in the enzyme-inhibitor complex. The inhibitor (abbreviated 4μ8C) blocks substrate access to the active site of IRE1 and selectively inactivates both Xbp1 splicing and IRE1-mediated mRNA degradation. Surprisingly, inhibition of IRE1 endonuclease activity does not sensitize cells to the consequences of acute endoplasmic reticulum stress, but rather interferes with the expansion of secretory capacity. Thus, the chemical reactivity and sterics of a unique residue in the endonuclease active site of IRE1 can be exploited by selective inhibitors to interfere with protein secretion in pathological settings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Integrin-linked kinase (ILK) and p38MAPK are protein kinases that transduce extracellular signals regulating cell migration and actin cytoskeletal organization. ILK-dependent regulation of p38MAPK is critical for mammalian kidney development and in smooth muscle cell migration, however, specific p38 isoforms has not been previously examined in ILK-regulated responses. Signaling by ILK and p38MAPK is often dysregulated in bladder cancer, and here we report a strong positive correlation between protein levels of ILK and p38β, which is the predominant isoform found in bladder cancer cells, as well as in patient-matched normal bladder and tumor samples. Knockdown by RNA interference of either p38β or ILK disrupts serum-induced, Rac1-dependent migration and actin cytoskeletal organization in bladder cancer cells. Surprisingly, ILK knockdown causes the selective reduction in p38β cellular protein level, without inhibiting p38β messenger RNA (mRNA) expression. The loss of p38β protein in ILK-depleted cells is partially rescued by the 26S proteasomal inhibitor MG132. Using co-precipitation and bimolecular fluorescent complementation assays, we find that ILK selectively forms cytoplasmic complexes with p38β. In situ proximity ligation assays further demonstrate that serum-stimulated assembly of endogenous ILK–p38β complexes is sensitive to QLT-0267, a small molecule ILK kinase inhibitor. Finally, inhibition of ILK reduces the amplitude and period of serum-induced activation of heat shock protein 27 (Hsp27), a target of p38β implicated in actin cytoskeletal reorganization. Our work identifies Hsp27 as a novel target of ILK–p38β signaling complexes, playing a key role in bladder cancer cell migration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Long-term autonomy in robotics requires perception systems that are resilient to unusual but realistic conditions that will eventually occur during extended missions. For example, unmanned ground vehicles (UGVs) need to be capable of operating safely in adverse and low-visibility conditions, such as at night or in the presence of smoke. The key to a resilient UGV perception system lies in the use of multiple sensor modalities, e.g., operating at different frequencies of the electromagnetic spectrum, to compensate for the limitations of a single sensor type. In this paper, visual and infrared imaging are combined in a Visual-SLAM algorithm to achieve localization. We propose to evaluate the quality of data provided by each sensor modality prior to data combination. This evaluation is used to discard low-quality data, i.e., data most likely to induce large localization errors. In this way, perceptual failures are anticipated and mitigated. An extensive experimental evaluation is conducted on data sets collected with a UGV in a range of environments and adverse conditions, including the presence of smoke (obstructing the visual camera), fire, extreme heat (saturating the infrared camera), low-light conditions (dusk), and at night with sudden variations of artificial light. A total of 240 trajectory estimates are obtained using five different variations of data sources and data combination strategies in the localization method. In particular, the proposed approach for selective data combination is compared to methods using a single sensor type or combining both modalities without preselection. We show that the proposed framework allows for camera-based localization resilient to a large range of low-visibility conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nanomaterials are prone to influence by chemical adsorption because of their large surface to volume ratios. This enables sensitive detection of adsorbed chemical species which, in turn, can tune the property of the host material. Recent studies discovered that single and multi-layer molybdenum disulfide (MoS2) films are ultra-sensitive to several important environmental molecules. Here we report new findings from ab inito calculations that reveal substantially enhanced adsorption of NO and NH3 on strained monolayer MoS2 with significant impact on the properties of the adsorbates and the MoS2 layer. The magnetic moment of adsorbed NO can be tuned between 0 and 1 μB; strain also induces an electronic phase transition between half-metal and metal. Adsorption of NH3 weakens the MoS2 layer considerably, which explains the large discrepancy between the experimentally measured strength and breaking strain of MoS2 films and previous theoretical predictions. On the other hand, adsorption of NO2, CO, and CO2 is insensitive to the strain condition in the MoS2 layer. This contrasting behavior allows sensitive strain engineering of selective chemical adsorption on MoS2 with effective tuning of mechanical, electronic, and magnetic properties. These results suggest new design strategies for constructing MoS2-based ultrahigh-sensitivity nanoscale sensors and electromechanical devices.