931 resultados para cryptographic protocols


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radiotherapy combined with three weekly 100 mg/m2 of cisplatin is the accepted standard of care in head and neck squamous cell carcinoma. However, this regimen is associated with severe toxicities with devastating effects on patients. Alternative protocols like weekly 40 mg/m2 have been used in an attempt to reduce toxicities. The main objective of the present study is to identify the dose intensities and toxicities of weekly cisplatin in patients treated in a tertiary centre over a 12 month period. Included patients had squamous cell carcinoma arising in the oral cavity, oropharynx, larynx, or hypopharynx. Patients were excluded if they had nasopharyngeal squamous cell carcinoma, distant metastasis or if they had prior treatment for head and neck cancer excluding neck dissection. During the study period, 52 patients met the inclusion criteria and their data were retrospectively obtained from the patients' database of St James hospital, Dublin. The median age of the study cohort was 54 years (range 33-73). Of the patients, 40 (76.9 %) were male and 12 (20.1 %) were female. The primary tumour sites were as follows: oral cavity and oropharynx in 38 (73 %), larynx in 10 (19 %), and hypopharynx in 4 (8 %). In total, 33 (63.5 %) patients had stage IV disease, while 19 (36.5 %) had stage III disease. Treatment was definitive in 35 (67 %) patients and adjuvant in 17 (35 %). Full-dose radiotherapy was achieved in 50 (96 %) patients. Only 22 (42.3 %) patients completed the intended six cycles of chemotherapy. Cumulative dose of 200 mg/m2 or more was reached in 37 (71 %) patients. The acute adverse effects included grades 3 and 4 mucositis, which occurred in 22 (43.3 %) and 6 patients (12 %), respectively. Grade 3 and 4 neutropenia occurred in six (11.5 %) and three (5.7 %) patients, respectively. The only other haematological toxicity was grade 3 anaemia in 20 (38.4 %) patients. There was no grade 3 or 4 renal toxicity among the study cohort, although grade 2 was observed in six (11.5 %) patients. Death occurred in one patient due to neutropenic septicaemia. In conclusion, weekly cisplatin is associated with moderate to severe toxicities and might lead to suboptimal chemotherapy delivery. More prospective clinical studies are required to determine the optimal chemoradiation regimen in head and neck squamous cell carcinoma.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This project involved writing Turrwan (great man), a novel set in Queensland in the nineteenth century, and an investigation into the way historical novels portray the past. Turrwan tells the story of Tom Petrie, who was six when he arrived with his family at the notorious Moreton Bay Penal Colony in 1837. The thesis examines historical fiction as a genre with particular focus on notions of historical authenticity. It analyses the complexities involved in a non-Indigenous person writing about the Australian Aboriginal people, and reflects on the process of researching, planning and writing a historical novel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To the Editor: In affluent-urban areas of India, overweight (6 %) and obesity (8 %) are prevalent in children as young as 2–5 y [1]. A potential risk factor for childhood obesity could be parent’s under-reporting their child’s anthropometry. In Indian culture, a larger body size is typically acceptable, and mothers may consider a chubby baby as healthy [2]. Therefore, it was proposed that Indian mothers may under-report their child’s weight status. The present study examined the validity of maternal reported height and weight of young, urban-affluent Indian children aged 2–5 y. After receiving approval from the QUT Human Research Ethics Committee, Australia 111 mothers with children aged 2–5 y attending private medical clinics (n = 5) in the affluent areas of Mumbai were recruited. Child’s height and weight were measured by the researcher using standard equipment/protocols. Mothers also reported their child’s height and weight.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social system-level analyses of journalism have tended to focus on political and economic influences, at the expense of other factors, such as the role that culture and cultural values play in shaping journalists' professional views and practices. This paper identifies cultural values as a particularly fruitful area for providing a more nuanced analysis of journalism culture. It examines this issue in the context of in-depth interviews with 20 M?ori journalists from Aotearoa New Zealand. The study finds that Indigenous journalism in that country is strongly influenced by M?ori cultural values, such as showing respect to others, following cultural protocols, and making use of culturally-specific language. Cultural limitations are also identified in the form of the social structures of M?ori society, and journalists' strategies in working around these are discussed. The paper highlights the implications a renewed focus on cultural values can have for the study of journalism culture more broadly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dendritic cells (DCs) play critical roles in immune-mediated kidney diseases. Little is known, however, about DC subsets in human chronic kidney disease, with previous studies restricted to a limited set of pathologies and to using immunohistochemical methods. In this study, we developed novel protocols for extracting renal DC subsets from diseased human kidneys and identified, enumerated, and phenotyped them by multicolor flow cytometry. We detected significantly greater numbers of total DCs as well as CD141(hi) and CD1c(+) myeloid DC (mDCs) subsets in diseased biopsies with interstitial fibrosis than diseased biopsies without fibrosis or healthy kidney tissue. In contrast, plasmacytoid DC numbers were significantly higher in the fibrotic group compared with healthy tissue only. Numbers of all DC subsets correlated with loss of kidney function, recorded as estimated glomerular filtration rate. CD141(hi) DCs expressed C-type lectin domain family 9 member A (CLEC9A), whereas the majority of CD1c(+) DCs lacked the expression of CD1a and DC-specific ICAM-3-grabbing nonintegrin (DC-SIGN), suggesting these mDC subsets may be circulating CD141(hi) and CD1c(+) blood DCs infiltrating kidney tissue. Our analysis revealed CLEC9A(+) and CD1c(+) cells were restricted to the tubulointerstitium. Notably, DC expression of the costimulatory and maturation molecule CD86 was significantly increased in both diseased cohorts compared with healthy tissue. Transforming growth factor-β levels in dissociated tissue supernatants were significantly elevated in diseased biopsies with fibrosis compared with nonfibrotic biopsies, with mDCs identified as a major source of this profibrotic cytokine. Collectively, our data indicate that activated mDC subsets, likely recruited into the tubulointerstitium, are positioned to play a role in the development of fibrosis and, thus, progression to chronic kidney disease.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines the design of ePortfolios for music postgraduate students utilizing a practice-led design iterative research process. It is suggested that the availability of Web 2.0 technologies such as blogs and social network software potentially provide creative artist with an opportunity to engage in a dialogue about art with artefacts of the artist products and processes present in that discussion. The design process applied Software Development as Research (SoDaR) methodology to simultaneously develop design and pedagogy. The approach to designing ePortfolio systems applied four theoretical protocols to examine the use of digitized artefacts to enable a dynamic and inclusive dialogue around representations of the students work. A negative case analysis identified a disjuncture between university access and control policy, and the relative openness of Web2.0 systems outside the institution that led to the design of an integrated model of ePortfolio.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent expansion in research in the field of lipidomics has been driven by the development of new mass spectrometric tools and protocols for the identification and quantification of molecular lipids in complex matrices. Although there are similarities between the field of lipidomics and the allied field of mass spectrometry (e.g., proteomics), lipids present some unique advantages and challenges for mass spectrometric analysis. The application of electrospray ionization to crude lipid extracts without prior fractionation-the so-called shotgun approach-is one such example, as it has perhaps been more successfully applied in lipidomics than in any other discipline. Conversely, the diverse molecular structure of lipids means that collision-induced dissociation alone may be limited in providing unique descriptions of complex lipid structures, and the development of additional, complementary tools for ion activation and analysis is required to overcome these challenges. In this article, we discuss the state of the art in lipid mass spectrometry and highlight several areas in which current approaches are deficient and further innovation is required.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim The aim of this paper was to explore the concept of expertise in nursing from the perspective of how it relates to current driving forces in health care in which it discusses the potential barriers to acceptance of nursing expertise in a climate in which quantification of value and cost containment run high on agendas. Background Expert nursing practice can be argued to be central to high quality, holistic, individualized patient care. However, changes in government policy which have led to the inception of comprehensive guidelines or protocols of care are in danger of relegating the ‘expert nurse’ to being an icon of the past. Indeed, it could be argued that expert nurses are an expensive commodity within the nursing workforce. Consequently, with this change to the use of clinical guidelines, it calls into question how expert nursing practice will develop within this framework of care. Method The article critically reviews the evidence related to the role of the Expert Nurse in an attempt to identify the key concepts and ideas, and how the inception of care protocols has implications for their role. Conclusion Nursing expertise which focuses on the provision of individualized, holistic care and is based largely on intuitive decision making cannot, should not be reduced to being articulated in positivist terms. However, the dominant power and decision-making focus in health care means that nurses must be confident in articulating the value of a concept which may be outside the scope of knowledge of those with whom they are debating. Relevance to clinical practice The principles of abduction or fuzzy logic may be useful in assisting nurses to explain in terms which others can comprehend, the value of nursing expertise.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Safety concerns in the operation of autonomous aerial systems require safe-landing protocols be followed during situations where the mission should be aborted due to mechanical or other failure. This article presents a pulse-coupled neural network (PCNN) to assist in the vegetation classification in a vision-based landing site detection system for an unmanned aircraft. We propose a heterogeneous computing architecture and an OpenCL implementation of a PCNN feature generator. Its performance is compared across OpenCL kernels designed for CPU, GPU, and FPGA platforms. This comparison examines the compute times required for network convergence under a variety of images to determine the plausibility for real-time feature detection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bitcoin is a distributed digital currency which has attracted a substantial number of users. We perform an in-depth investigation to understand what made Bitcoin so successful, while decades of research on cryptographic e-cash has not lead to a large-scale deployment. We ask also how Bitcoin could become a good candidate for a long-lived stable currency. In doing so, we identify several issues and attacks of Bitcoin, and propose suitable techniques to address them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.