904 resultados para Identity based encryption
Resumo:
Cette thèse étudie la façon dont trois romans latino-canadiens utilisent le trope de l’exil comme allégorie d’un trauma historique qui comprend plus que l’expérience individuelle de ses protagonistes : la transition forcée de l’État vers le Marché en Amérique latine effectuée par les dictatures. Cobro revertido (1992) de José Leandro Urbina; Le pavillon des miroirs (1994) Sergio Kokis; et Rojo, amarillo y verde (2003) de Alejandro Saravia, explorent divers aspects de ce processus à travers les exercices de mémoire de leurs personnages. L’exil oblige les protagonistes de ces oeuvres à se confronter aux limites des structures sémiotiques par lesquelles ils essaient de donner un fondement idéologique à leur existence sociale. Ils découvrent ainsi qu’il n’est pas possible de reproduire des hiérarchies, des valeurs, ni des relations de pouvoir de leur pays d’origine dans leur pays d’accueil, non seulement à cause des différences culturelles, mais aussi à cause d’un changement historique qui concerne la relation du sujet avec la collectivité et le territoire. Ces œuvres abordent l’expérience de ce changement par un dialogue avec différents genres littéraires comme le roman de fondation, la méta-fiction historique du Boom, le roman de formation et le testimonio, mis en relation avec divers moments historiques, de la période nationale-populaire aux transitions, en passant par les dictatures. Cela permet aux auteurs de réfléchir aux mécanismes narratifs que plusieurs œuvres latino-américaines du XXème siècle ont utilisé pour construire et naturaliser des subjectivités favorables aux projets hégémoniques des États nationaux. Ces exercices méta-narratifs comprennent le rôle de l’écriture comme support privilégié pour l’articulation d’une identité avec le type de communauté imaginaire qu’est la nation. Ils servent aussi à signaler les limites de l’écriture dans le moment actuel du développement technologique des médias et de l’expansion du capitalisme transnational. Ainsi, les auteurs de ces œuvres cherchent d’autres formes de représentation pour rendre visibles les traces d’autres histoires qui n’ont pas pu être incorporées dans le discours historique officiel.
Resumo:
Memória e identidade encontram-se intrinsecamente ligadas ao património arquitectónico. Sensíveis ao passar do tempo, estes conceitos adaptaram-se atribuindo aos sítios novos significados. O Mosteiro de São Bento de Cástris em Évora, classificado como Monumento Nacional e sendo o primeiro mosteiro cisterciense a Sul do Tejo, foi também celeiro agrícola e mais tarde instituição de acolhimento de menores, encontra-se actualmente desocupado. Questiona-se assim, qual a actual identidade deste lugar? Através do estudo dos valores culturais materiais e imateriais do lugar, no período entre 1957 a 2016, esta investigação procurará identificar esta identidade através do registo das memórias recentes do lugar, da bibliografia específica e da análise do conjunto edificado. Considerando os princípios emanados pela UNESCO que consideram que a preservação do património deve respeitar a autenticidade e integridade dos bens culturais, que permanece na identidade registada na memória, procurouse entender a relação entre a contínua utilização do mosteiro e a estima colectiva por este património arquitectónico, essencial para a continuidade da sua identidade no futuro; The Monastery of São Bento de Cástris: Memory and Identity ABSTRACT: Memory and identity are intrinsically connected to architectural heritage. Their adaptability through time, results in the development of new meanings to the places. The Monastery of São Bento de Cástris in Évora, classified as National Heritage, the first Cistercian monastery built in the South of Portugal, was later a farm barn, a foster care institution and is now empty. Thus a question is posed: what is the current identity of this monastery? Through the study of the place’s material and immaterial cultural values, focus on the period from 1957-2016, this research aims to identify the identity based on the memories of the place, in specific bibliography, and in the analysis of the built environment. Following the UNESCO principles which consider that heritage conservation should respect the integrity and authenticity of the cultural assets, the impact of the continuous usage of the monastery was studied as a method to understand the collective esteem for this architectural heritage, which is vital to the preservation of its identity in the future.
Resumo:
This article studies the importance of pedagogical mediation in helping first-year students in the Teacher Training area to advance from intellectual heteronomy to intellectual autonomy. It explains some strategies and experiences implemented by the authors. It focuses on the need of paying attention to students in order to understand their expectations, opinions and previous experiences as a basis for developing different topics and concepts, to favor an actual free participation in the pedagogical mediation dynamics and, consequently, opportunities for students to express themselves with autonomy. The aforementioned strategies allow for the transition from a pedagogy centered on teaching to a pedagogy centered on learning, in such a way that the future educator becomes a protagonist in his/her formation and constructs his/her own intellectual identity, based on the concept of action-reflection-action. The authors of this article consider that the first year in higher education is a privileged opportunity to develop the autonomy of future teachers, and, as stated by Freire (2004), the respect for autonomy is an ethical imperative.
Resumo:
Un sistema di cifratura IBE (Identity-Based Encription Scheme) si basa su un sistema crittografico a chiave pubblica, costituita però in questo caso da una stringa arbitraria. Invece di generare una coppia casuale di chiavi pubbliche e private e pubblicare la prima, l'utente utilizza come chiave pubblica la sua "identità", ovvero una combinazione di informazioni opportune (nome, indirizzo...) che lo identifichino in maniera univoca. In questo modo ad ogni coppia di utenti risulta possibile comunicare in sicurezza e verificare le reciproche firme digitali senza lo scambio di chiavi private o pubbliche, senza la necessità di mantenere una key directory e senza dover ricorrere ogni volta ai servizi di un ente esterno. Nel 2001 Boneh e Franklin proposero uno schema completamente funzionante con sicurezza IND-ID-CCA, basato su un analogo del problema computazionale di Diffie-Hellman e che da un punto di vista tecnico-matematico utilizza la crittografia su curve ellittiche e la mappa bilineare Weil Pairing.
Resumo:
A phase-only encryption/decryption scheme with the readout based on the zeroth-order phase-contrast technique (ZOPCT), without the use of a phase-changing plate on the Fourier plane of an optical system based on the 4f optical correlator, is proposed. The encryption of a gray-level image is achieved by multiplying the phase distribution obtained directly from the gray-level image by a random phase distribution. The robustness of the encoding is assured by the nonlinearity intrinsic to the proposed phase-contrast method and the random phase distribution used in the encryption process. The experimental system has been implemented with liquid-crystal spatial modulators to generate phase-encrypted masks and a decrypting key. The advantage of this method is the easy scheme to recover the gray-level information from the decrypted phase-only mask applying the ZOPCT. An analysis of this decryption method was performed against brute force attacks. (C) 2009 Society of Photo-Optical Instrumentation Engineers. [DOI: 10.1117/1.3223629]
Resumo:
Evidence for expectancy-based priming in the pronunciation task was provided in three experiments. In Experiments 1 and 2, a high proportion of associatively related trials produced greater associative priming and superior retrieval of primes in a subsequent test of memory for primes, whereas high- and low-proportion groups showed comparable repetition benefits in perceptual identification of previously presented primes. In Experiment 2, the low-proportion condition had few associatively related pairs hut many identity pairs. In Experiment 3, identity priming was greater in a high- than a low-identity proportion group, with similar repetition benefits and prime retrieval responses for the two groups. These results indicate that when the prime-target relationship is salient, subjects strategically vary their processing of the prime according to the nature of the prime-target relationship.
Resumo:
Based on third order linear sequences, an improvement version of the Diffie-Hellman distribution key scheme and the ElGamal public key cryptosystem scheme are proposed, together with an implementation and computational cost. The security relies on the difficulty of factoring an RSA integer and on the difficulty of computing the discrete logarithm.
Resumo:
Following their detection and seizure by police and border guard authorities, false identity and travel documents are usually scanned, producing digital images. This research investigates the potential of these images to classify false identity documents, highlight links between documents produced by a same modus operandi or same source, and thus support forensic intelligence efforts. Inspired by previous research work about digital images of Ecstasy tablets, a systematic and complete method has been developed to acquire, collect, process and compare images of false identity documents. This first part of the article highlights the critical steps of the method and the development of a prototype that processes regions of interest extracted from images. Acquisition conditions have been fine-tuned in order to optimise reproducibility and comparability of images. Different filters and comparison metrics have been evaluated and the performance of the method has been assessed using two calibration and validation sets of documents, made up of 101 Italian driving licenses and 96 Portuguese passports seized in Switzerland, among which some were known to come from common sources. Results indicate that the use of Hue and Edge filters or their combination to extract profiles from images, and then the comparison of profiles with a Canberra distance-based metric provides the most accurate classification of documents. The method appears also to be quick, efficient and inexpensive. It can be easily operated from remote locations and shared amongst different organisations, which makes it very convenient for future operational applications. The method could serve as a first fast triage method that may help target more resource-intensive profiling methods (based on a visual, physical or chemical examination of documents for instance). Its contribution to forensic intelligence and its application to several sets of false identity documents seized by police and border guards will be developed in a forthcoming article (part II).
Resumo:
Vertebrate gap junctions are aggregates of transmembrane channels which are composed of connexin (Cx) proteins encoded by at least fourteen distinct genes in mammals. Since the same Cx type can be expressed in different tissues and more than one Cx type can be expressed by the same cell, the thorough identification of which connexin is in which cell type and how connexin expression changes after experimental manipulation has become quite laborious. Here we describe an efficient, rapid and simple method by which connexin type(s) can be identified in mammalian tissue and cultured cells using endonuclease cleavage of RT-PCR products generated from "multi primers" (sense primer, degenerate oligonucleotide corresponding to a region of the first extracellular domain; antisense primer, degenerate oligonucleotide complementary to the second extracellular domain) that amplify the cytoplasmic loop regions of all known connexins except Cx36. In addition, we provide sequence information on RT-PCR primers used in our laboratory to screen individual connexins and predictions of extension of the "multi primer" method to several human connexins.
Resumo:
In this paper we propose a cryptographic transformation based on matrix manipulations for image encryption. Substitution and diffusion operations, based on the matrix, facilitate fast conversion of plaintext and images into ciphertext and cipher images. The paper describes the encryption algorithm, discusses the simulation results and compares with results obtained from Advanced Encryption Standard (AES). It is shown that the proposed algorithm is capable of encrypting images eight times faster than AES.
Resumo:
In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure
Resumo:
We present the first empirical study to reveal the presence of implicit discrimination in a non-experimental setting. By using a large dataset of in-match data in the English Premier League, we show that white referees award significantly more yellow cards against non-white players of oppositional identity. We argue that this is the result of implicit discrimination by showing that this discriminatory behaviour: (i) increases in how rushed the referee is before making a decision, and (ii) it increases in the level of ambiguity of the decision. The variation in (i) and (ii) cannot be explained by any form of conscious discrimination such as taste-based or statistical discrimination. Moreover, we show that oppositional identity players do not differ in their behaviour from other players along several dimensions related to aggressiveness and style of play providing further evidence that this is not statistical discrimination.
Resumo:
In e-health intervention studies, there are concerns about the reliability of internet-based, self-reported (SR) data and about the potential for identity fraud. This study introduced and tested a novel procedure for assessing the validity of internet-based, SR identity and validated anthropometric and demographic data via measurements performed face-to-face in a validation study (VS). Participants (n = 140) from seven European countries, participating in the Food4Me intervention study which aimed to test the efficacy of personalised nutrition approaches delivered via the internet, were invited to take part in the VS. Participants visited a research centre in each country within 2 weeks of providing SR data via the internet. Participants received detailed instructions on how to perform each measurement. Individual’s identity was checked visually and by repeated collection and analysis of buccal cell DNA for 33 genetic variants. Validation of identity using genomic information showed perfect concordance between SR and VS. Similar results were found for demographic data (age and sex verification). We observed strong intra-class correlation coefficients between SR and VS for anthropometric data (height 0.990, weight 0.994 and BMI 0.983). However, internet-based SR weight was under-reported (Δ −0.70 kg [−3.6 to 2.1], p < 0.0001) and, therefore, BMI was lower for SR data (Δ −0.29 kg m−2 [−1.5 to 1.0], p < 0.0001). BMI classification was correct in 93 % of cases. We demonstrate the utility of genotype information for detection of possible identity fraud in e-health studies and confirm the reliability of internet-based, SR anthropometric and demographic data collected in the Food4Me study.
Resumo:
Drastic biodiversity declines have raised concerns about the deterioration of ecosystem functions and have motivated much recent research on the relationship between species diversity and ecosystem functioning. A functional trait framework has been proposed to improve the mechanistic understanding of this relationship, but this has rarely been tested for organisms other than plants. We analysed eight datasets, including five animal groups, to examine how well a trait-based approach, compared with a more traditional taxonomic approach, predicts seven ecosystem functions below- and above-ground. Trait-based indices consistently provided greater explanatory power than species richness or abundance. The frequency distributions of single or multiple traits in the community were the best predictors of ecosystem functioning. This implies that the ecosystem functions we investigated were underpinned by the combination of trait identities (i.e. single-trait indices) and trait complementarity (i.e. multi-trait indices) in the communities. Our study provides new insights into the general mechanisms that link biodiversity to ecosystem functioning in natural animal communities and suggests that the observed responses were due to the identity and dominance patterns of the trait composition rather than the number or abundance of species per se.