952 resultados para Lee, Jason


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed before by Huang and Wong \cite{DBLP:conf/acisp/HuangW07}. We use a direct construction from Kiltz and Galindo's KEM scheme \cite{DBLP:conf/acisp/KiltzG06} to obtain a certificateless KEM in the standard model; our construction is roughly twice as efficient as the generic construction. We also address the security flaw discovered by Selvi et al. \cite{cryptoeprint:2009:462}.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the years, approaches to obesity prevention and treatment have gone from focusing on genetic and other biological factors to exploring a diversity of diets and individual behavior modification interventions anchored primarily in the power of the mind, to the recent shift focusing on societal interventions to design ";temptation-proof"; physical, social, and economic environments. In spite of repeated calls to action, including those of the World Health Organization (WHO), the pandemic continues to progress. WHO recently projected that if the current lifestyle trend in young and adult populations around the world persist, by 2012 in countries like the USA, health care costs may amount to as much as 17.7% of the GDP. Most importantly, in large part due to the problems of obesity, those children may be the first generation ever to have a shorter life expectancy than that of their parents. This work presents the most current research and proposals for addressing the pandemic. Past studies have focused primarly on either genetic or behavioral causes for obesity, however today's research indicates that a strongly integrated program is the best prospect for success in overcoming obesity. Furthermore, focus on the role of society in establishing an affordable, accessible and sustainable program for implementing these lifestyle changes is vital, particularly for those in economically challenged situations, who are ultimately at the highest risk for obesity. Using studies from both neuroscience and behavioral science to present a comprehensive overview of the challenges and possible solutions, The brain-to-society approach to obesity prevention focuses on what is needed in order to sustain a healthy, pleasurable and affordable lifestyle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge of the regulation of food intake is crucial to an understanding of body weight and obesity. Strictly speaking, we should refer to the control of food intake whose expression is modulated in the interests of the regulation of body weight. Food intake is controlled, body weight is regulated. However, this semantic distinction only serves to emphasize the importance of food intake. Traditionally food intake has been researched within the homeostatic approach to physiological systems pioneered by Claude Bernard, Walter Cannon and others; and because feeding is a form of behaviour, it forms part of what Curt Richter referred to as the behavioural regulation of body weight (or behavioural homeostasis). This approach views food intake as the vehicle for energy supply whose expression is modulated by a metabolic drive generated in response to a requirement for energy. The idea was that eating behaviour is stimulated and inhibited by internal signalling systems (for the drive and suppression of eating respectively) in order to regulate the internal environment (energy stores, tissue needs).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Intention to Notice: the collection, the tour and ordinary landscapes is concerned with how ordinary landscapes and places are enabled and conserved through making itineraries that are framed around the ephemera encountered by chance, and the practices that make possible the endurance of these material traces. Through observing and then examining the material and temporal aspects of a variety of sites/places, the museum and the expanded garden are identified as spaces where the expression of contemporary political, ecological and social attitudes to cultural landscapes can be realised through a curatorial approach to design, to effect minimal intervention. Three notions are proposed to encourage investigation into contemporary cultural landscapes: To traverse slowly to allow space for speculations framed by the topographies and artefacts encountered; to [re]make/[re]write cultural landscapes as discursive landscapes that provoke the intention to notice; and to reveal and conserve the fabric of everyday places. A series of walking, recording and making projects undertaken across a variety of cultural landscapes in remote South Australia, Melbourne, Sydney, London, Los Angeles, Chandigarh, Padova and Istanbul, investigate how communities of practice are facilitated through the invitation to notice and intervene in ordinary landscapes, informed by the theory and practice of postproduction and the reticent auteur. This community of practice approach draws upon chance encounters and it seeks to encourage creative investigation into places. The Intention to Notice is a practice of facilitating that also leads to recording traces and events; large and small, material and immaterial, that encourages both conjecture and archive. Most importantly, there is an open-ended invitation to commit and exchange through design interaction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.