938 resultados para Cryptographic key
Resumo:
The From Boys to Men Project was funded by the Economic and Social Research
Council to explore why some boys become domestic abuse perpetrators when
others do not. In so doing, it sought to establish what more could be done to
reduce the number of young men who become perpetrators. The study
involved three phases of data collection including: Phase 1 - a survey of school
children aged 13-14, Phase 2 - focus groups with 69 young people aged 13-19,
and Phase 3 - life history interviews with 30 young men, aged 16-21, who had experienced domestic violence as victims, perpetrators or witnesses.
Resumo:
The From Boys to Men Project was funded by the Economic and Social Research
Council to explore why some boys become domestic abuse perpetrators when
others do not. In so doing, it sought to establish what more could be done to
reduce the number of young men who become perpetrators. The study
involved three phases of data collection including: Phase 1 - a survey of school
children aged 13-14, Phase 2 - focus groups with 69 young people aged 13-19,
and Phase 3 - life history interviews with 30 young men, aged 16-21, who had experienced domestic violence as victims, perpetrators or witnesses.
Resumo:
The From Boys to Men Project was funded by the Economic and Social Research
Council to explore why some boys become domestic abuse perpetrators when
others do not. In so doing, it sought to establish what more could be done to
reduce the number of young men who become perpetrators. The study
involved three phases of data collection including: Phase 1 - a survey of school
children aged 13-14, Phase 2 - focus groups with 69 young people aged 13-19,
and Phase 3 - life history interviews with 30 young men, aged 16-21, who
had experienced domestic violence as victims, perpetrators or witnesses.
Resumo:
Studies of marine sediments, cave speleothemes, annually laminated corals, and tree rings from Asian monsoon regions have added knowledge to our understanding of the factors that control inter-annual to millennial monsoon variability in the past and have provided important constraints for climate modeling scenarios. In contrast, the spatial and temporal pattern of sub-millennial scale monsoon variability and its impact on land cover in SE Asia are still unresolved. This shortcoming stems from the fact that temporally well-resolved paleo-environmental studies are missing from large parts of SE Asia, especially from Thailand. Given that global and regional climate models are increasingly using terrestrial paleo- data to test their performance, past changes in land cover are therefore important variables to better understand feedbacks between different Earth systems. We obtained sediments from Lake Nong Thale Pron, in southern Thailand (8º 10`N, 99 º23`E; 380 m.asl). The aim of our study is to reconstruct lake status changes and to evaluate whether the extent of these changes are linked to known shifts in monsoon intensity and variability. Preliminary results show that lake infilling started more than 15,000 years ago and that the sediments cover the last deglaciation and the Holocene. Current analyses include Itrax XRF core scanning, loss-on-ignition (LOI at 950 and 550ºC), CN elemental and isotopic composition. We expect that our results will be able to give a picture of how the lake's status has changed over time and whether the extent of these changes is linked to known shifts in monsoon intensity and variability.
Resumo:
The research on integrated energy system technology meets the major national strategic needs of China. Focusing on the vital theory of planning and optimal operation of integrated energy system, six fundamental problems in the study of integrated energy system are proposed systematically, including the common modeling technology for integrated energy system, the integrated simulation of integrated energy system, the planning theory and method of integrated energy system, the security theory and method of integrated energy system, the optimal operation and control of integrated energy system, the benefit assessment and operational mechanisms of integrated energy system. The status of domestic and foreign research directions related to each scientific problems are surveyed and anticipated.
Resumo:
Innate immunity represents the first line of defence against invading pathogens. It consists of an initial inflammatory response that recruits white blood cells to the site of infection in an effort to destroy and eliminate the pathogen. Some pathogens replicate within host cells, and cell death by apoptosis is an important effector mechanism to remove the replication niche for such microbes. However, some microbes have evolved evasive strategies to block apoptosis, and in these cases host cells may employ further countermeasures, including an inflammatory form of cell death know as necroptosis. This review aims to highlight the importance of the RIP kinase family in controlling these various defence strategies. RIP1 is initially discussed as a key component of death receptor signalling and in the context of dictating whether a cell triggers a pathway of pro-inflammatory gene expression or cell death by apoptosis. The molecular and functional interplay of RIP1 and RIP3 is described, especially with respect to mediating necroptosis and as key mediators of inflammation. The function of RIP2, with particular emphasis on its role in NOD signalling, is also explored. Special attention is given to emphasizing the physiological and pathophysiological contexts for these various functions of RIP kinases.
Resumo:
Microarray technology has recently accelerated the study of the molecular events involved in prostate cancer, offering the prospect of more precise prognosis and new therapeutic strategies. This review summarises current knowledge of the molecular pathology of prostate cancer. The expression and function of numerous genes have been shown to be altered in prostate cancer. Many of these genes are involved in cell cycle regulation, steroid hormone metabolism or regulation of gene expression. The mechanisms by which androgen independence arises are discussed, including cross-activation, gene amplification and point mutations of the androgen receptor. Analysis of changes in the levels of expression of large numbers of genes during prostate cancer progression have provided a better understanding of the basis of the disease, yielding new molecular markers, such as hepsin, with potential use in diagnosis and prognosis.
Resumo:
It is now well established that cancer cells exhibit a number of genetic defects in the machinery that governs programmed cell death and that sabotage of apoptosis is one of the principal factors aiding in the evolution of the carcinogenic phenotype. A number of studies have implicated aberrant DNA methylation as a key survival mechanism in cancer, whereby promoter hypermethylation silences genes essential for many processes including apoptosis. To date, studies on the methylation profile of apoptotic genes have largely focused on cancers of the breast, colon and stomach, with only limited data available on prostate cancer. Here we discuss the major developments in the field of DNA methylation and its role in the regulation of aberrant apoptosis in prostate cancer. The most significant advances have involved the discovery of apoptotic gene targets of methylation, including XAF1, (fragile histidine triad (FHIT ), cellular retinol binding protein 1 (CRBP1), decoy receptor 1(DCR1), decoy receptor 2 (DCR2 ), target of methylation-induced silenceing 1 (TMS1), TNF receptor superfamily, member 6 (FAS), Reprimo (RPRM) and GLI pathogenesis-related 1 (GLIPR1). These genes are reported to be hypermethylated in prostate cancer and some offer potential as diagnostic and prognostic markers. We also introduce the concept of an 'apoptotic methylation signature' for prostate cancer and evaluate its potential in a diagnostic, prognostic and therapeutic setting.
Resumo:
Physically Unclonable Functions (PUFs), exploit inherent manufacturing variations and present a promising solution for hardware security. They can be used for key storage, authentication and ID generations. Low power cryptographic design is also very important for security applications. However, research to date on digital PUF designs, such as Arbiter PUFs and RO PUFs, is not very efficient. These PUF designs are difficult to implement on Field Programmable Gate Arrays (FPGAs) or consume many FPGA hardware resources. In previous work, a new and efficient PUF identification generator was presented for FPGA. The PUF identification generator is designed to fit in a single slice per response bit by using a 1-bit PUF identification generator cell formed as a hard-macro. In this work, we propose an ultra-compact PUF identification generator design. It is implemented on ten low-cost Xilinx Spartan-6 FPGA LX9 microboards. The resource utilization is only 2.23%, which, to the best of the authors' knowledge, is the most compact and robust FPGA-based PUF identification generator design reported to date. This PUF identification generator delivers a stable range of uniqueness of around 50% and good reliability between 85% and 100%.
Resumo:
Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.