933 resultados para collision avoidance


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vision-based underwater navigation and obstacle avoidance demands robust computer vision algorithms, particularly for operation in turbid water with reduced visibility. This paper describes a novel method for the simultaneous underwater image quality assessment, visibility enhancement and disparity computation to increase stereo range resolution under dynamic, natural lighting and turbid conditions. The technique estimates the visibility properties from a sparse 3D map of the original degraded image using a physical underwater light attenuation model. Firstly, an iterated distance-adaptive image contrast enhancement enables a dense disparity computation and visibility estimation. Secondly, using a light attenuation model for ocean water, a color corrected stereo underwater image is obtained along with a visibility distance estimate. Experimental results in shallow, naturally lit, high-turbidity coastal environments show the proposed technique improves range estimation over the original images as well as image quality and color for habitat classification. Furthermore, the recursiveness and robustness of the technique allows implementation onboard an Autonomous Underwater Vehicle for improving navigation and obstacle avoidance performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes the development and experimental evaluation of a novel vision-based Autonomous Surface Vehicle with the purpose of performing coordinated docking manoeuvres with a target, such as an Autonomous Underwater Vehicle, on the water’s surface. The system architecture integrates two small processor units; the first performs vehicle control and implements a virtual force obstacle avoidance and docking strategy, with the second performing vision-based target segmentation and tracking. Furthermore, the architecture utilises wireless sensor network technology allowing the vehicle to be observed by, and even integrated within an ad-hoc sensor network. The system performance is demonstrated through real-world experiments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This invention concerns the control of rotating excavation machinery, for instance to avoid collisions with obstacles. In a first aspect the invention is a control system for autonomous path planning in excavation machinery, comprising: A map generation subsystem to receive data from an array of disparate and complementary sensors to generate a 3-Dimensional digital terrain and obstacle map referenced to a coordinate frame related to the machine's geometry, during normal operation of the machine. An obstacle detection subsystem to find and identify obstacles in the digital terrain and obstacle map, and then to refine the map by identifying exclusion zones that are within reach of the machine during operation. A collision detection subsystem that uses knowledge of the machine's position and movements, as well as the digital terrain and obstacle map, to identify and predict possible collisions with itself or other obstacles, and then uses a forward motion planner to predict collisions in a planned path. And, a path planning subsystem that uses information from the other subsystems to vary planned paths to avoid obstacles and collisions. In other aspects the invention is excavation machinery including the control system; a method for control of excavation machinery; and firmware and software versions of the control system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis developed a condition assessment and rating method to identify those bridges in a network which are in most need of repair for an effective life cycle management. The method estimates the contribution of critical factors towards bridge deterioration and uses structural analysis to overcome the subjectivity of traditional current condition assessment methods. This research was a part of the CRC project titled 'Life Cycle Management of Railway Bridges'. Efficient usage of resources and enhancing the safety and serviceability of railway bridges are the significant outcomes of using the proposed method.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The collisions between colloidal metal nanoparticles and a carbon electrode were explored as a dynamic method for the electrodeposition of a diverse range of electrocatalytically active Ag and Au nanostructures whose morphology is dominated by the electrostatic interaction between the charge of the nanoparticle and metal salt.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter explores the status of the current programs designed to address global tax avoidance, critiques the role that the G20 plays in the reform agenda, and considers the part that Australia will play in the process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes current research at the Australian Centre for Field Robotics (ACFR) in collaboration with the Commonwealth Scientific and Industrial Research Organisation (CSIRO) within the Cooperative Research Centre (CRC) for Mining Technology and Equipment (CMTE) towards achieving autonomous navigation of underground vehicles, like a Load-Haul-Dump (LHD) truck. This work is being sponsored by the mining industry through the Australian Mineral Industries Research Association Limited (AMIRA). Robust and reliable autonomous navigation can only be realised by achieving high level tasks such as path-planning and obstacle avoidance. This requires determining the pose (position and orientation) of the vehicle at all times. A minimal infrastructure localisation algorithm that has been developed for this purpose is outlined and the corresponding results are presented. Further research issues that are under investigation are also outlined briefly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reviews the state-of-the-art in the automation of underground mining vehicles and reports on the development of an autonomous navigation system under development through the CMTE with sponsorship arranged by AMIRA. Past attempts at automating LHDs and haul trucks are described and their particular strengths and weaknesses are discussed. The auto-guidance system being developed overcomes some of the limitations of state-of-the-art prototype æcommercialÆ systems. It can be retrofitted to existing remote controlled vehicles, uses minimum installed infrastructure and is flexible enough for rapid relocation to alternate routes. The navigation techniques use data fusion of two separate sets of sensors combining natural feature recognition, nodal maps and inertial navigation techniques. Collision detection is incorporated and people and other traffic are excluded from the tramming area. This paper describes the work being done by the group with regard to auto-tramming and also outlines the future goals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This program of research investigated the harmful effects of mistreatment by the workgroup, and the role of perceived rejection as a critical mediator linking mistreatment and outcomes. This research program had three primary purposes. First, the research aimed to examine the important role of workgroup mistreatment as an independent predictor of negative outcomes, over and above the influence of supervisor mistreatment. Second, the research aimed to examine the effect of perceived rejection as an explanatory variable linking workgroup mistreatment and outcomes. Finally, the moderating effect of organizational norms on the relationship between workgroup mistreatment and perceived rejection was examined. The relationships of interest were examined over four studies, using multiple methods of data collection, across part-time and full-time working samples. In Study 1 (Chapter 2), the independent role of workgroup mistreatment and the mediating role of perceived rejection were examined. One hundred and forty two part-time working participants took part in the study. The participants completed a questionnaire on workplace behaviors in their organizations. The results of hierarchical regression analyses revealed a strong harmful effect of workgroup mistreatment, independent of mistreatment by the supervisor. In addition, the results showed that perceived rejection fully mediated the relationship between workgroup mistreatment and depression and organizational based self esteem. The study highlighted that perceived rejection acts as a key underlying psychological mechanism involved in the effect of workgroup mistreatment. This study has been published in the Journal of Occupational Health Psychology. Study 2 and Study 3 were presented as one paper in Chapter 3. The aims of these two studies was to explore the effects of workgroup mistreatment on a wider range of individual and organizational level outcomes, and to provide further evidence of the mediating role of perceived rejection as observed in Study 1. The results from both studies demonstrated that workgroup mistreatment had a significant and independent role in predicting negative individual and organizational level outcomes, providing support for the findings of Study 1. In the first study, 189 participants received scenarios manipulating workgroup mistreatment and supervisor mistreatment. The results of hierarchical regression analyses revealed that workgroup mistreatment harmfully affected participants, over and above that of the supervisor. The results also demonstrated that perceived rejection mediated the positive relationships between workgroup mistreatment and depression and organizational deviance, and also the negative relationships between workgroup mistreatment and organizational based self esteem and organizational citizenship behaviors. The second study included an additional aim, to examine the moderating role of supportive organizational norms. Two hundred and twenty nine participants read scenarios that manipulated workgroup mistreatment, supervisor mistreatment and organizational norms. The results of hierarchical regression analyses revealed the significant harmful effects of workgroup mistreatment, over and above the influence of supervisor mistreatment. The results also revealed the mediating role of perceived rejection. The direct effect of positive organizational norms also emerged, consistent with previous research. In addition, the result revealed that employees who experienced supportive organizational norms were more likely to reconcile with their workgroup members after experiencing mistreatment compared to employees who experienced hostile organizational norms. Finally, an unexpected pattern on the key affective variables of depression and organizational based self esteem emerged, such that mistreatment led to more negative outcomes in the supportive norms condition than in the hostile condition, where employees appeared to be desensitized. This paper is currently under review at the Journal of Applied Social Psychology. In Study 4 (Chapter 4), the overall model of workplace mistreatment was tested on a sample of full-time workers in an applied setting. One hundred and seventy two adults took part in the study. Participants were required to evaluate their workplace regarding mistreatment and organizational norms and to report their own psychological, behavioral and organizational outcomes. The results revealed that workgroup mistreatment was associated with increased depression, stress and avoidance, over and above supervisor mistreatment. In addition, the results revealed that perceived rejection acted as an explanatory variable linking workgroup mistreatment to a number of outcomes. Furthermore, the moderating role of hostile organizational norms emerged on depression, stress, reconciliation and avoidance. This paper is currently under review at the Journal of Occupational Health Psychology. Overall, the four studies provided empirical support for the majority of the hypotheses. The effects were demonstrated for a range of psychological, behavioral, and organizational level outcomes, using multiple methods of data collection, across part-time and full-time workers. At the conclusion of the thesis (Chapter 5), an overall summary is provided of the findings across all four studies, practical and theoretical implications and research directions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Kids Helpline is an Australian 24-hour telephone counselling helpline for children and young people up to the age of 25 years old. The service operates with the core values of empowerment for clients, and the use of child-centred practices, one aspect of which is a non-directive approach highlighted by the avoidance of overt advice giving. Through analysis of a single call to the helpline, this chapter demonstrates how counsellors actively manage and minimise the normative and asymmetric properties of advice in the course if helping clients develop options for change. In doing so we illustrate the practical relevance and enactment of abstract institutional policies and discuss the interactional affordances of institutional constraints on practice.