880 resultados para broadcast encryption


Relevância:

10.00% 10.00%

Publicador:

Resumo:

A novel and fast technique for cryptographic applications is designed and developed using the symmetric key algorithm “MAJE4” and the popular asymmetric key algorithm “RSA”. The MAJE4 algorithm is used for encryption / decryption of files since it is much faster and occupies less memory than RSA. The RSA algorithm is used to solve the problem of key exchange as well as to accomplish scalability and message authentication. The focus is to develop a new hybrid system called MARS4 by combining the two cryptographic methods with an aim to get the advantages of both. The performance evaluation of MARS4 is done in comparison with MAJE4 and RSA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In wireless sensor networks, the routing algorithms currently available assume that the sensor nodes are stationary. Therefore when mobility modulation is applied to the wireless sensor networks, most of the current routing algorithms suffer from performance degradation. The path breaks in mobile wireless networks are due to the movement of mobile nodes, node failure, channel fading and shadowing. It is desirable to deal with dynamic topology changes with optimal effort in terms of resource and channel utilization. As the nodes in wireless sensor medium make use of wireless broadcast to communicate, it is possible to make use of neighboring node information to recover from path failure. Cooperation among the neighboring nodes plays an important role in the context of routing among the mobile nodes. This paper proposes an enhancement to an existing protocol for accommodating node mobility through neighboring node information while keeping the utilization of resources to a minimum.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In wireless sensor networks, the routing algorithms currently available assume that the sensor nodes are stationary. Therefore when mobility modulation is applied to the wireless sensor networks, most of the current routing algorithms suffer from performance degradation. The path breaks in mobile wireless networks are due to the movement of mobile nodes, node failure, channel fading and shadowing. It is desirable to deal with dynamic topology changes with optimal effort in terms of resource and channel utilization. As the nodes in wireless sensor medium make use of wireless broadcast to communicate, it is possible to make use of neighboring node information to recover from path failure. Cooperation among the neighboring nodes plays an important role in the context of routing among the mobile nodes. This paper proposes an enhancement to an existing protocol for accommodating node mobility through neighboring node information while keeping the utilization of resources to a minimum.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Presently different audio watermarking methods are available; most of them inclined towards copyright protection and copy protection. This is the key motive for the notion to develop a speaker verification scheme that guar- antees non-repudiation services and the thesis is its outcome. The research presented in this thesis scrutinizes the field of audio water- marking and the outcome is a speaker verification scheme that is proficient in addressing issues allied to non-repudiation to a great extent. This work aimed in developing novel audio watermarking schemes utilizing the fun- damental ideas of Fast-Fourier Transform (FFT) or Fast Walsh-Hadamard Transform (FWHT). The Mel-Frequency Cepstral Coefficients (MFCC) the best parametric representation of the acoustic signals along with few other key acoustic characteristics is employed in crafting of new schemes. The au- dio watermark created is entirely dependent to the acoustic features, hence named as FeatureMark and is crucial in this work. In any watermarking scheme, the quality of the extracted watermark de- pends exclusively on the pre-processing action and in this work framing and windowing techniques are involved. The theme non-repudiation provides immense significance in the audio watermarking schemes proposed in this work. Modification of the signal spectrum is achieved in a variety of ways by selecting appropriate FFT/FWHT coefficients and the watermarking schemes were evaluated for imperceptibility, robustness and capacity char- acteristics. The proposed schemes are unequivocally effective in terms of maintaining the sound quality, retrieving the embedded FeatureMark and in terms of the capacity to hold the mark bits. Robust nature of these marking schemes is achieved with the help of syn- chronization codes such as Barker Code with FFT based FeatureMarking scheme and Walsh Code with FWHT based FeatureMarking scheme. An- other important feature associated with this scheme is the employment of an encryption scheme towards the preparation of its FeatureMark that scrambles the signal features that helps to keep the signal features unreve- laed. A comparative study with the existing watermarking schemes and the ex- periments to evaluate imperceptibility, robustness and capacity tests guar- antee that the proposed schemes can be baselined as efficient audio water- marking schemes. The four new digital audio watermarking algorithms in terms of their performance are remarkable thereby opening more opportu- nities for further research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Little is known about the residual effects of crop residue (CR) and phosphorus (P) application on the fallow vegetation following repeated cultivation of pearl millet [Pennisetum glaucum (L.) R. Br.] in the Sahel. The objective of this study, therefore, was (i) to measure residual effects of CR, mulched at annual rates of 0, 500, 1000 and 2000 kg CR ha^-1, broadcast P at 0 and 13 kg P ha^-1 and P placement at 0, 1, 3, 5 and 7 kg P ha^-1 on the herbaceous dry matter (HDM) 2 years after the end of the experiment and (ii) to test a remote sensing method for the quantitative estimation of HDM. Compared with unmulched plots, a doubling of HDM was measured in plots that had received at least 500 kg CR ha^-1. Previous broadcast P application led to HDM increases of 14% compared with unfertilised control plots, whereas no residual effects of P placement were detected. Crop residue and P treatments caused significant shifts in flora composition. Digital analysis of colour photographs taken of the fallow vegetation and the bare soil revealed that the number of normalised green band pixels averaged per plot was highly correlated with HDM (r=0.86) and that red band pixels were related to differences in soil surface crusting. Given the traditional use of fallow vegetation as fodder, the results strongly suggest that for the integrated farming systems of the West African Sahel, residual effects of soil amendments on the fallow vegetation should be included in any comprehensive analysis of treatment effects on the agro-pastoral system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Low phosphorus (P) in acid sandy soils of the West African Sudano-Sahelian zone is a major limitation to crop growth. To compare treatment effects on total dry matter (TDM) of crops and plant available P (P-Bray and isotopically exchangeable P), field experiments were carried out for 2 years at four sites where annual rainfall ranged from 560 to 850 mm and topsoil pH varied between 4.2 and 5.6. Main treatments were: (i) crop residue (CR) mulch at 500 and 2000 kg ha^-1, (ii) eight different rates and sources of P and (iii) cereal/legume rotations including millet (Pennisetum glaucum L.), sorhum [Sorghum bicolor (L.) Moench], cowpea (Vigna unguiculata Walp.) and groundnut (Arachis hypogaea L.). For the two Sahelian sites with large CR-induced differences in TDM, mulching did not modify significantly the soils' buffering capacity for phosphate ions but led to large increases in the intensity factor (C_p) and quantity of directly available soil P (E_1min). In the wetter Sudanian zone lacking effects of CR mulching on TDM mirrored a decline of E_1min with CR. Broadcast application of soluble single superphosphate (SSP) at 13 kg P ha^-1 led to large increases in C_p and quantity of E_1min at all sites which translated in respective TDM increases. The high agronomic efficiency of SSP placement (4 kg P ha^-1) across sites could be explained by consistent increases in the quantity factor which confirms the power of the isotopic exchange method in explaining management effects on crop growth across the region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phosphorus (P) deficiency is a major constraint to pearl millet (Pennisetum glaucum L.) growth on acid sandy soils of the West African Sahel. To develop cost-effective fertilization strategies for cash poor farmers, experiments with pearl millet were conducted in southwestern Niger. Treatments comprised single superphosphate hill-placed at rates of 1, 3, 5 or 7 kg P ha^−1 factorially combined with broadcast P at a rate of 13 kg ha^−1. Nitrogen was applied as calcium ammonium nitrate at rates of 30 and 45 kg ha^−1. At low soil moisture, placement of single superphosphate in immediate proximity to the seed reduced seedling emergence. Despite these negative effects on germination, P placement resulted in much faster growth of millet seedlings than did broadcast P. With P application, potassium nutrition of millet was improved and seedling nitrogen uptake increased two- to three-fold, indicating that nitrogen was not limiting early millet growth. Averaged over the 1995 and 1996 cropping seasons, placed applications of 3, 5 and 7 kg P ha^−1 led to 72%, 81% and 88% respectively, of the grain yield produced by broadcasting 13 kg P ha^−1. Nitrogen application did not show major effects on grain yield unless P requirements were met. A simple economic analysis revealed that the profitability of P application, defined as additional income per unit of fertilizer, was highest for P placement at 3 and 5 kg ha^−1.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bildbasierte Authentifizierung und Verschlüsselung: Identitätsbasierte Kryptographie (oft auch identity Based Encryption, IBE) ist eine Variation der asymmetrischen Schlüsselverfahren, bei der der öffentliche Schlüssel des Anwenders eine beliebig wählbare Zeichenfolge sein darf, die dem Besitzer offensichtlich zugeordnet werden kann. Adi Shamir stellte 1984 zunächst ein solches Signatursystem vor. In der Literatur wird dabei als öffentlicher Schlüssel meist die Email-Adresse oder eine Sozialversicherungsnummer genannt. Der Preis für die freie Schlüsselwahl ist die Einbeziehung eines vertrauenswürdigen Dritten, genannt Private Key Generator, der mit seinem privaten Generalschlüssel den privaten Schlüssel des Antragstellers generiert. Mit der Arbeit von Boneh und Franklin 2001 zum Einsatz der Weil-Paarbildung über elliptischen Kurven wurde IBE auf eine sichere und praktikable Grundlage gestellt. In dieser Arbeit wird nach einer allgemeinen Übersicht über Probleme und Lösungsmöglichkeiten für Authentifizierungsaufgaben im zweiten Teil als neue Idee der Einsatz eines Bildes des Anwenders als öffentlicher Schlüssel vorgeschlagen. Dazu wird der Ablauf der Schlüsselausgabe, die Bestellung einer Dienstleistung, z. B. die Ausstellung einer personengebundenen Fahrkarte, sowie deren Kontrolle dargestellt. Letztere kann offline auf dem Gerät des Kontrolleurs erfolgen, wobei Ticket und Bild auf dem Handy des Kunden bereitliegen. Insgesamt eröffnet sich dadurch die Möglichkeit einer Authentifizierung ohne weitere Preisgabe einer Identität, wenn man davon ausgeht, dass das Bild einer Person angesichts allgegenwärtiger Kameras sowieso öffentlich ist. Die Praktikabilität wird mit einer Implementierung auf der Basis des IBE-JCA Providers der National University of Ireland in Maynooth demonstriert und liefert auch Aufschluss auf das in der Praxis zu erwartende Laufzeitverhalten.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this report, we discuss the application of global optimization and Evolutionary Computation to distributed systems. We therefore selected and classified many publications, giving an insight into the wide variety of optimization problems which arise in distributed systems. Some interesting approaches from different areas will be discussed in greater detail with the use of illustrative examples.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In der vorliegenden Dissertation werden Systeme von parallel arbeitenden und miteinander kommunizierenden Restart-Automaten (engl.: systems of parallel communicating restarting automata; abgekürzt PCRA-Systeme) vorgestellt und untersucht. Dabei werden zwei bekannte Konzepte aus den Bereichen Formale Sprachen und Automatentheorie miteinander vescrknüpft: das Modell der Restart-Automaten und die sogenannten PC-Systeme (systems of parallel communicating components). Ein PCRA-System besteht aus endlich vielen Restart-Automaten, welche einerseits parallel und unabhängig voneinander lokale Berechnungen durchführen und andererseits miteinander kommunizieren dürfen. Die Kommunikation erfolgt dabei durch ein festgelegtes Kommunikationsprotokoll, das mithilfe von speziellen Kommunikationszuständen realisiert wird. Ein wesentliches Merkmal hinsichtlich der Kommunikationsstruktur in Systemen von miteinander kooperierenden Komponenten ist, ob die Kommunikation zentralisiert oder nichtzentralisiert erfolgt. Während in einer nichtzentralisierten Kommunikationsstruktur jede Komponente mit jeder anderen Komponente kommunizieren darf, findet jegliche Kommunikation innerhalb einer zentralisierten Kommunikationsstruktur ausschließlich mit einer ausgewählten Master-Komponente statt. Eines der wichtigsten Resultate dieser Arbeit zeigt, dass zentralisierte Systeme und nichtzentralisierte Systeme die gleiche Berechnungsstärke besitzen (das ist im Allgemeinen bei PC-Systemen nicht so). Darüber hinaus bewirkt auch die Verwendung von Multicast- oder Broadcast-Kommunikationsansätzen neben Punkt-zu-Punkt-Kommunikationen keine Erhöhung der Berechnungsstärke. Desweiteren wird die Ausdrucksstärke von PCRA-Systemen untersucht und mit der von PC-Systemen von endlichen Automaten und mit der von Mehrkopfautomaten verglichen. PC-Systeme von endlichen Automaten besitzen bekanntermaßen die gleiche Ausdrucksstärke wie Einwegmehrkopfautomaten und bilden eine untere Schranke für die Ausdrucksstärke von PCRA-Systemen mit Einwegkomponenten. Tatsächlich sind PCRA-Systeme auch dann stärker als PC-Systeme von endlichen Automaten, wenn die Komponenten für sich genommen die gleiche Ausdrucksstärke besitzen, also die regulären Sprachen charakterisieren. Für PCRA-Systeme mit Zweiwegekomponenten werden als untere Schranke die Sprachklassen der Zweiwegemehrkopfautomaten im deterministischen und im nichtdeterministischen Fall gezeigt, welche wiederum den bekannten Komplexitätsklassen L (deterministisch logarithmischer Platz) und NL (nichtdeterministisch logarithmischer Platz) entsprechen. Als obere Schranke wird die Klasse der kontextsensitiven Sprachen gezeigt. Außerdem werden Erweiterungen von Restart-Automaten betrachtet (nonforgetting-Eigenschaft, shrinking-Eigenschaft), welche bei einzelnen Komponenten eine Erhöhung der Berechnungsstärke bewirken, in Systemen jedoch deren Stärke nicht erhöhen. Die von PCRA-Systemen charakterisierten Sprachklassen sind unter diversen Sprachoperationen abgeschlossen und einige Sprachklassen sind sogar abstrakte Sprachfamilien (sogenannte AFL's). Abschließend werden für PCRA-Systeme spezifische Probleme auf ihre Entscheidbarkeit hin untersucht. Es wird gezeigt, dass Leerheit, Universalität, Inklusion, Gleichheit und Endlichkeit bereits für Systeme mit zwei Restart-Automaten des schwächsten Typs nicht semientscheidbar sind. Für das Wortproblem wird gezeigt, dass es im deterministischen Fall in quadratischer Zeit und im nichtdeterministischen Fall in exponentieller Zeit entscheidbar ist.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maize production in western Kenya is often limited by deficiencies of nitrogen and phosphorus. We assessed the effectiveness of Tithonia diversifolia green manure (tithonia), farmyard manure (FYM) and urea as sources of nitrogen (N) for maize when inorganic phosphorus (P) fertiliser was either broadcast (BR) or spot-placed in the planting hole (SP) for two consecutive seasons; October to December of 1998 and April to August of 1999 at two sites; Nyabeda and Khwisero in western Kenya. A randomised complete block design with four replications was used. Maize yields were higher at Nyabeda and responded to P application better than at Khwisero. At the same N rate, tithonia and FYM were as effective as urea in increasing maize yields at both sites. There were no significant differences in maize yields when phosphate fertiliser was either BR or SP regardless of the N source used in the first season. However, in the second season, the residual yields for the BR treatments were consistently higher than those of the SP. Our results suggest that tithonia and FYM can substitute for urea as N sources and that fertiliser P should be broadcast and incorporated together with the organic materials at the time of planting to save on labour costs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This share has a web resource on hacking. The web resource provides a tutorial on hacking and then an interactive quiz to test the user's knowledge.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El estudio responde las preguntas sobre injerencia política hacia medios radioeléctricos por parte del gobierno chavecista con el cierre de RCTV; con la identificación de instrumentos jurídicos hacia los medias y la examinación en que el gobierno manejó estos instrumentos de regulación.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resource and flyer produced for INFO2009 12/13. An animation on public-key encryption related to cybercrime and cybersecurity. Target audience is undergraduates, but the resource does not assume prior knowledge of the topics, or any in-depth knowledge of IT.