999 resultados para key issuing


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless mesh networks (WMNs) have the ability to integrate with other networks while providing a fast and cost-saving deployment. The network security is one of important challenge problems in this kind of networks. This paper is focused on key management between mesh and sensor networks. We propose an efficient key pre-distribution scheme based on two polynomials in wireless mesh networks by employing the nature of heterogeneity. Our scheme realizes the property of bloom filters, i.e., neighbor nodes can discover their shared keys but have no knowledge on the different keys possessed by the other node, without the probability of false positive. The analysis presented in this paper shows that our scheme has the ability to establish three different security level keys and achieves the property of self adaptive security for sensor networks with acceptable computation and communication consumption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

During the last decade, the striated muscle activator of Rho signaling (STARS), a muscle-specific protein, has been proposed to play an increasingly important role in skeletal muscle growth, metabolism, regeneration and stress adaptation. STARS influences actin dynamics and, as a consequence, regulates the myocardin-related transcription factor A/serum response factor (MRTF-A/SRF) transcriptional program, a well-known pathway controlling skeletal muscle development and function. Muscle-specific stress conditions, such as exercise, positively regulates, while disuse and degenerative muscle diseases are associated with a downregulation of STARS and its downstream partners, suggesting a pivotal role for STARS in skeletal muscle health. This review provides a comprehensive overview of the known role and regulation of STARS and the members of its signaling pathway, RhoA, MRTF-A and SRF, in skeletal muscle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper initiates the study of two specific security threats on smart-card-based password authentication in distributed systems. Smart-card-based password authentication is one of the most commonly used security mechanisms to determine the identity of a remote client, who must hold a valid smart card and the corresponding password to carry out a successful authentication with the server. The authentication is usually integrated with a key establishment protocol and yields smart-card-based password-authenticated key agreement. Using two recently proposed protocols as case studies, we demonstrate two new types of adversaries with smart card: 1) adversaries with pre-computed data stored in the smart card, and 2) adversaries with different data (with respect to different time slots) stored in the smart card. These threats, though realistic in distributed systems, have never been studied in the literature. In addition to point out the vulnerabilities, we propose the countermeasures to thwart the security threats and secure the protocols. © 2013 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2013, the Australian Temperament Project (ATP) longitudinal study celebrated its 30th anniversary. This article provides a brief overview of the ATP, and highlights some key findings that have emerged over the past three decades. From amongst the many research areas explored in the ATP, topics covered here include temperament, learning problems, mental health, risk-taking, bullying, positive development, and relationships with parents in adulthood. Future plans for the study are also presented, including the new ATP Generation 3 Study which commenced in 2011 - a unique longitudinal study of the children of the ATP participants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An ambitious survey of the field, by an international group of scholars, that looks toward the future of person-organization fit. Explores how people form their impressions of fit and the impact these have on their behavior, and how companies can maximize fit. Includes multiple perspectives on the topic of how people fit into organizations, discussing issues across the field and incorporating insights from related disciplines. Actively encourages scholars to take part in organizational fit research, drawing on workshops and symposia held specially for this book to explore some of the creative directions that the field is taking into the future. © 2013 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic keys are necessary to secure communications among mesh clients in wireless mesh networks. Traditional key establishment schemes are implemented at higher layers, and the security of most such designs relies on the complexity of computational problems. Extracting cryptographic keys at the physical layer is a promising approach with information-theoretical security. But due to the nature of communications at the physical layer, none of the existing designs supports key establishment if communicating parties are out of each other's radio range, and all schemes are insecure against man-in-the-middle attacks. This paper presents a cross-layer key establishment scheme where the established key is determined by two partial keys: one extracted at the physical layer and the other generated at higher layers. The analysis shows that the proposed cross-layer key establishment scheme not only eliminates the aforementioned shortcomings of key establishment at each layer but also provides a flexible solution to the key generation rate problem. © 2014 Springer International Publishing Switzerland.