943 resultados para DBMS Oracle Hibernate JSP Java


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block cipher is ideal. We address the problem of building indifferentiable compression functions from the PGV compression functions. We consider a general form of 64 PGV compression functions and replace the linear feed-forward operation in this generic PGV compression function with an ideal block cipher independent of the one used in the generic PGV construction. This modified construction is called a generic modified PGV (MPGV). We analyse indifferentiability of the generic MPGV construction in the ideal cipher model and show that 12 out of 64 MPGV compression functions in this framework are indifferentiable from a FIL-RO. To our knowledge, this is the first result showing that two independent block ciphers are sufficient to design indifferentiable single-block-length compression functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a new approach for creating and implementing an ad-hoc underwater acoustic sensor network based on connecting a small processor to the serial port of a commercial CDMA acoustic modem. The processor acts as a "node controller" providing the networking layer that the modems lack. The ad-hoc networking protocol is based on a modified dynamic source routing (DSR) approach and can be configured for maximising information throughput or minimising energy expenditure. The system was developed in simulation and then evaluated during field trials using a 10 node deployment. Experimental results show reliable multi-hop networking under a variety of network configurations, with the added ability to determine internode ranges to within 1.5 m for localisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as birthday and dictionary attacks on the hash values of passwords to find passwords, it is usually recommended to apply hash function to the combination of both the salt and password, denoted salt||password, to prevent these attacks. In this paper, we present the first security analysis of salt||password hashing application. We show that when hash functions based on the compression functions with easily found fixed points are used to compute the salt||password hashes, these hashes are susceptible to precomputed offline birthday attacks. For example, this attack is applicable to the salt||password hashes computed using the standard hash functions such as MD5, SHA-1, SHA-256 and SHA-512 that are based on the popular Davies-Meyer compression function. This attack exposes a subtle property of this application that although the provision of salt prevents an attacker from finding passwords, salts prefixed to the passwords do not prevent an attacker from doing a precomputed birthday attack to forge an unknown password. In this forgery attack, we demonstrate the possibility of building multiple passwords for an unknown password for the same hash value and salt. Interestingly, password||salt (i.e. salts suffixed to the passwords) hashes computed using Davies-Meyer hash functions are not susceptible to this attack, showing the first security gap between the prefix-salt and suffix-salt methods of hashing passwords.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trailing Touch (2014) is a twenty minute classically-based dance work set to music by composers Carter Burwell and Hildur Gudnadottir. It is an abstract work that explores images based on imperfect patterns and seeks to transmit the sensations felt when clusters form and disperse through the space or crisscross to create swirling wave-like reactions in the dancers’ tulle skirts. These simple references are inspired by the lyrical use of arms found in ballet, particular to the ballet aesthetic. Trailing Touch was created in collaboration with QUT’s third-year BFA (Dance Performance) students and performed as part of Dance14 at QUT’s Gardens Points Theatre from the 4th to 8th November 2014 and was performed in Singapore as part of Contact Contemporary Dance Festival on 30th November, 2014. Additionally, the creative process of Trailing Touch (2014) forms the initial project of Phase III of my PhD research, Writing the Dance Score in the Twenty-first Century: An approach for the Independent Choreographer. This PhD research will examine the potential of dance scores as a suite of choreographic strategies to map key aspects of the choreographic process. While a certain degree of ambiguity drives the creative process, the suite of choreographic strategies attempt to capture what is transmitted through the lived experience of dance. “[T]hese documents harbor a force of expression, a visual energy related to the body and the movement” (Louppe 1994, 7) that triggers movement responses, unforeseen intensities and enables personal interpretation. Consequently, Phase III will test and evaluate the relevance of Phase II research within the pressures of mainstream dance rehearsal and performance contexts. In Project One Trailing Touch this was demonstrated in the dance scores produced by the choreographer and interpreted by the dancers within the performance. By drawing from both the theoretical and practical, it is anticipated that this research will suggest a form of languaging movement that is not reliant on images or numbers, but generated in response to the intuitive and complex process underpinning choreographic practice. Rather than constructing a codified dance notation system, it will focus on strategies that reveal movement, its spatial patterns, qualities and intensities of expression and the procedures underlying key choreographic concepts. The outcome of this research project aims to support the independent choreographer in two major areas, by facilitating and enriching the choreographic process for both the performers and choreographer, and by strengthening artistic development and performance outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper summarises literature on unemployment, mental health and Work for the Dole programs. Australian and international evidence suggests that unemployed young people are more likely to experience mental health problems than employed people (e.g. greater anxiety and depression, higher suicide rates). Drawing on research undertaken in Australia and overseas we identify a link between mental health and unemployment. However, there is a lack of firm evidence with respect to the impact of Work for the Dole programs on the mental health of unemployed young Australians. There is the possibility that with the Australian Government's proposed expansion of the program any benefits of Work for the Dole on mental health of young unemployed people could be diminished or lost. There is a clear need for more research in this area.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bearing faults are the most common cause of wind turbine failures. Unavailability and maintenance cost of wind turbines are becoming critically important, with their fast growing in electric networks. Early fault detection can reduce outage time and costs. This paper proposes Anomaly Detection (AD) machine learning algorithms for fault diagnosis of wind turbine bearings. The application of this method on a real data set was conducted and is presented in this paper. For validation and comparison purposes, a set of baseline results are produced using the popular one-class SVM methods to examine the ability of the proposed technique in detecting incipient faults.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Overvoltage and overloading due to high utilization of PVs are the main power quality concerns for future distribution power systems. This paper proposes a distributed control coordination strategy to manage multiple PVs within a network to overcome these issues. PVs reactive power is used to deal with over-voltages and PVs active power curtailment are regulated to avoid overloading. The proposed control structure is used to share the required contribution fairly among PVs, in proportion to their ratings. This approach is examined on a practical distribution network with multiple PVs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Achieving high efficiency with improved power transfer range and misalignment tolerance is the major design challenge in realizing Wireless Power Transfer (WPT) systems for industrial applications. Resonant coils must be carefully designed to achieve highest possible system performance by fully utilizing the available space. High quality factor and enhanced electromagnetic coupling are key indices which determine the system performance. In this paper, design parameter extraction and quality factor optimization of multi layered helical coils are presented using finite element analysis (FEA) simulations. In addition, a novel Toroidal Shaped Spiral (TSS) coil is proposed to increase power transfer range and misalignment tolerance. The proposed shapes and recommendations can be used to design high efficiency WPT resonator in a limited space.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A modularized battery system with Double Star Chopper Cell (DSCC) based modular multilevel converter is proposed for a battery operated electric vehicle (EV). A design concept for the modularized battery micro-packs for DSCC is described. Multidimensional pulse width modulation (MD-PWM) with integrated inter-module SoC balancing and fault tolerant control is proposed and explained. The DSCC can be operated either as an inverter to drive the EV motor or as a synchronous rectifier connected to external three phase power supply equipment for charging the battery micro-packs. The methods of operation as inverter and synchronous rectifier with integrated inter-module SoC balancing and fault tolerant control are discussed. The proposed system operation as inverter and synchronous rectifier are verified through simulations and the results are presented.