180 resultados para CRYPTOGRAPHIC PAIRINGS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Subtle quantum properties offer exciting new prospects in optical communications. For example, quantum entanglement enables the secure exchange of cryptographic keys(1) and the distribution of quantum information by teleportation(2,3). Entangled bright beams of light are increasingly appealing for such tasks, because they enable the use of well-established classical communications techniques(4). However, quantum resources are fragile and are subject to decoherence by interaction with the environment. The unavoidable losses in the communication channel can lead to a complete destruction of entanglement(5-8), limiting the application of these states to quantum-communication protocols. We investigate the conditions under which this phenomenon takes place for the simplest case of two light beams, and analyse characteristics of states which are robust against losses. Our study sheds new light on the intriguing properties of quantum entanglement and how they may be harnessed for future applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensors and actuators Networks specified by IEEE 802.15.4, are becoming increasingly being applied to instrumentation, as in instrumentation of oil wells with completion Plunger Lift type. Due to specific characteristics of the environment being installed, it s find the risk of compromising network security, and presenting several attack scenarios and the potential damage from them. It`s found the need for a more detailed security study of these networks, which calls for use of encryption algorithms, like AES-128 bits and RC6. So then it was implement the algorithms RC6 and AES-128, in an 8 bits microcontroller, and study its performance characteristics, critical for embedded applications. From these results it was developed a Hybrid Algorithm Cryptographic, ACH, which showed intermediate characteristics between the AES and RC6, more appropriate for use in applications with limitations of power consumption and memory. Also was present a comparative study of quality of security among the three algorithms, proving ACH cryptographic capability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Two lines of rainbow trout (Oncorhynchus mykiss) that exhibit divergent endocrine responsiveness to stressors also display disparate behavioral traits. To investigate whether the high-responding (HR) and low-responding (LR) fish also differ in cognitive function, the rate of extinction of a conditioned response was compared between the two lines. Groups of HR and LR fish were exposed to a paired conditioned stimulus (CS- water off) and unconditioned stimulus (US; confinement stressor). After exposure to 18 CS-US pairings, at least 70% of individuals of both lines acquired a conditioned response (CR) manifested as an elevation of blood cortisol levels on presentation of the CS only. Post-conditioning, the fish were tested by presentation of the CS at weekly intervals, for 4 weeks, with no further reinforcement, and the extinction of the CR in the two lines was compared. The decline in mean plasma cortisol levels after exposure to the CS over successive tests suggested that the CR was retained for a shorter period among the HR (<14 days) than LR fish (<21 days). The frequency of individuals within each line whose plasma cortisol levels indicated a stress response when exposed to the CS was significantly greater among the LR than HR fish at 14 and 21 days with no HR fish falling into this category at 21 days. At 28 days post-conditioning, there were no HR fish and only three LR fish were categorized as stressed. These results suggest that there are differences in cognitive function between the two lines. Possible mechanisms underlying these differences are discussed. (C) 2004 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Medical images are private to doctor and patient. Digital medical images should be protected against unauthorized viewers. One way to protect digital medical images is using cryptography to encrypt the images. This paper proposes a method for encrypting medical images with a traditional symmetric cryptosystem. We use biometrics to protect the cryptographic key. Both encrypted image and cryptographic key can be transmitted over public networks with security and only the person that owns the biometrics information used in key protection can decrypt the medical image. © Springer Science+Business Media B.V. 2008.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on conventional cryptographic systems, as the passwords can be easily copied or stolen. The usage of a biometric approach for releasing the keys is an alternative to the password-based mechanisms. But just like passwords, we need mechanisms to keep the biometrical signal safe. One approach for such mechanism is to use biometrical key cryptography. The cryptographic systems based on the use of biometric characteristics as keys are called biometrical cryptographic systems. This article presents the implementation of Fuzzy Vault, a biometrical cryptographic system written in Java, along with its performance evaluation. Fuzzy Vault was tested on a real application using smartcards.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Deer species of the genus Mazama show significant inter and intraspecific chromosomal variation due to the occurrence of rearrangements and B chromosomes. Given that carriers of aneuploidies and structural rearrangements often show anomalous chromosome pairings, we here performed a synaptonemal complex analysis to study chromosome pairing behavior in a red brocket deer (Mazama americana) individual that is heterozygous for a Robertsonian translocation, is a B chromosome carrier, and has a multiple sex chromosome system (XY1Y2). The synaptonemal complex in spermatocytes showed normal chromosome pairings for all chromosomes, including the autosomal and sex trivalents. The electromicrographs showed homology among B chromosomes since they formed bivalents, but they also appeared as univalents, indicating their anomalous behavior and non-Mendelian segregation. Thus, synaptonemal complex analysis is a useful tool to evaluate the role of B chromosomes and rearrangements during meiosis on the intraspecific chromosomal variation that is observed in the majority of Mazama species. © FUNPEC-RP.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pós-graduação em Ciência da Computação - IBILCE

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Um estímulo neutro, quando pareado a um estímulo aversivo incondicional, adquire a função de aversivo (condicional) e, indiretamente, também é capaz de suprimir operantes. Tal fenômeno foi denominado de “supressão condicionada” e está principalmente relacionado a certos estados emocionais, como a ansiedade. A literatura mostra que, em geral, o estímulo aversivo incondicional utilizado se restringe ao choque elétrico. Foram poucos os estímulos aversivos alternativos testados que se mostraram eficazes. Entretanto, mesmo utilizando o choque como aversivo incondicional, há outras variáveis que podem influenciar diretamente o surgimento do fenômeno. Este trabalho teve por objetivo examinar e comparar a produção de supressão condicionada com dois tipos de estímulos aversivos: jato de ar quente (JAQ) e choque elétrico. Foram utilizados 4 ratos albinos (Rattus norvegicus, Wistar). Duas Caixas de Condicionamento Operante, uma utilizada para o estímulo choque e a outra adaptada para o JAQ, serviram de equipamentos. Os sujeitos foram divididos em duplas e expostos a pareamentos de um estímulo neutro com diferentes estímulos aversivos: Som+JAQ (Sujeito J1 e J2) e Som+Choque elétrico (Sujeito C1 e C2). Os dados mostram que os sujeitos expostos ao delineamento com choque apresentaram uma razão supressiva total (0,0) após dois (C1) ou três (C2) pareamentos, o que significa que o som tornou-se um aversivo condicional capaz de suprimir integralmente a freqüência da resposta de pressão à barra (RPB). Já para os sujeitos expostos ao procedimento com JAQ ocorreu somente supressão parcial da RPB frente ao som, sendo necessárias no mínimo oito (J1) e sete (J2) pareamentos para que os valores da razão supressiva chegassem a 0,5 (J1) e 0,2 (J2). As análises de outras respostas mostraram que em média ocorreu um aumento de 83,3% (J1) e 275% (J2) na frequência das respostas exploratórias durante a apresentação do som, nas sessões de pareamento com o JAQ, comparado com a apresentação do som nas sessões de habituação, enquanto que para os sujeitos que foram expostos ao pareamento com o choque houve uma supressão de 44,2% (C1) e 57,1% (C2) em tais respostas. Tais dados permitem concluir que a supressão ocasionada pelo pareamento do som+choque atingiu outras classes de respostas, diferente do som pareado com o JAQ. A supressão ocasionada pelo JAQ parece ter sido conseqüência da emissão de respostas exploratórias. É possível que o parâmetro intensidade do JAQ, utilizado neste experimento, tenha sido a variável responsável por tais resultados. Futuras pesquisas poderão elucidar estes dados.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We introduce three specific cryptography based hierarchical schemes, which can effectively enforce and implement access control and are designed for distributed environments because they do not need the presence of a central authority (except perhaps for set- UP).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Septins form a conserved family of filament forming GTP binding proteins found in a wide range of eukaryotic cells. They share a common structural architecture consisting of an N-terminal domain, a central GTP binding domain and a C-terminal domain, which is often predicted to adopt a coiled-coil conformation, at least in part. The crystal structure of the human SEPT2/SEPT6/SEPT7 heterocomplex has revealed the importance of the GTP binding domain in filament formation, but surprisingly no electron density was observed for the C-terminal domains and their function remains obscure. The dearth of structural information concerning the C-terminal region has motivated the present study in which the putative C-terminal domains of human SEPT2, SEPT6 and SEPT7 were expressed in E. coli and purified to homogeneity. The thermal stability and secondary structure content of the domains were studied by circular dichroism spectroscopy, and homo- and hetero-interactions were investigated by size exclusion chromatography, chemical cross-linking, analytical ultracentrifugation and surface plasmon resonance. Our results show that SEPT6-C and SEPT7-C are able to form both homo- and heterodimers with a high alpha-helical content in solution. The heterodimer is elongated and considerably more stable than the homodimers, with a K (D) of 15.8 nM. On the other hand, the homodimer SEPT2-C has a much lower affinity, with a K (D) of 4 mu M, and a moderate alpha-helical content. Our findings present the first direct experimental evidence toward better understanding the biophysical properties and coiled-coil pairings of such domains and their potential role in filament assembly and stability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The incorporation of modified nucleotides into ribonucleic acids (RNAs) is important for their structure and proper function. These modifications are inserted by distinct catalytic macromolecules one of them being Dnmt2. It methylates the Cytidine (C) at position 38 in tRNA to 5-methylcytidine (m5C). Dnmt2 has been a paradigm in this respect, because all of its nearest neighbors in evolution are DNA-cytosine C5-methyltransferases and methylate DNA, while its (own) DNA methyltransferase activity is the subject of controversial reports with rates varying between zero and very weak. This work determines whether the biochemical potential for DNA methylation is present in the enzyme. It was discovered that DNA fragments, when presented as covalent RNA:DNA hybrids in the structural context of a tRNA, can be more efficiently methylated than the corresponding natural tRNA substrate. Additional minor deviations from a native tRNA structure that were seen to be tolerated by Dnmt2 were used for a stepwise development of a composite system of guide RNAs that enable the enzyme to perform cytidine methylation on single stranded DNA in vitro. Furthermore, a proof-of-principle is presented for utilizing the S-adenosyl methionine-analog cofactor SeAdoYn with Dnmt2 to search for new possible substrates in a SELEX-like approach.rnIn innate immunity, nucleic acids can function as pathogen associated molecular patterns (PAMPs) recognized by pattern recognition receptors (PRRs). The modification pattern of RNA is the discriminating factor for toll-like receptor 7 (TLR7) to distinguish between self and non-self RNA of invading pathogens. It was found that a 2'-O-methylated guanosine (Gm) at position18, naturally occurring at this position in some tRNAs, antagonizes recognition by TLR7. In the second part of this work it is pointed out, that recognition extends to the next downstream nucleotide and the effectively recognized molecular detail is actually a methylated dinucleotide. The immune silencing effect of the ribose methylation is most pronounced if the dinucleotide motif is composed of purin nucleobases whereas pyrimidines diminish the effect. Similar results were obtained when the Gm modification was transposed into other tRNA domains. Point mutations abolishing base pairings important for a proper tertiary structure had no effect on the immune stimulatory potential of a Gm modified tRNA. Taken together these results suggest a processive type of RNA inspection by TLR7.rn

Relevância:

10.00% 10.00%

Publicador:

Resumo:

During wakefulness and sleep, neurons in the neocortex emit action potentials tonically or in rhythmic bursts, respectively. However, the role of synchronized discharge patterns is largely unknown. We have recently shown that pairings of excitatory postsynaptic potentials (EPSPs) and action potential bursts or single spikes lead to long-term depression (burst-LTD) or long-term potentiation, respectively. In this study, we elucidate the cellular mechanisms of burst-LTD and characterize its functional properties. Whole-cell patch-clamp recordings were obtained from layer V pyramidal cells in somatosensory cortex of juvenile rats in vitro and composite EPSPs and EPSCs were evoked extracellularly in layers II/III. Repetitive burst-pairings led to a long-lasting depression of EPSPs and EPSCs that was blocked by inhibitors of metabotropic glutamate group 1 receptors, phospholipase C, protein kinase C (PKC) and calcium release from the endoplasmic reticulum, and that required an intact machinery for endocytosis. Thus, burst-LTD is induced via a Ca2+- and phosphatidylinositol-dependent activation of PKC and expressed through phosphorylation-triggered endocytosis of AMPA receptors. Functionally, burst-LTD is inversely related to EPSP size and bursts dominate single spikes in determining the sign of synaptic plasticity. Thus burst-firing constitutes a signal by which coincident synaptic inputs are proportionally downsized. Overall, our data thus suggest a mechanism by which synaptic weights can be reconfigured during non-rapid eye movement sleep.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes Poisson log-linear multilevel models to investigate population variability in sleep state transition rates. We specifically propose a Bayesian Poisson regression model that is more flexible, scalable to larger studies, and easily fit than other attempts in the literature. We further use hierarchical random effects to account for pairings of individuals and repeated measures within those individuals, as comparing diseased to non-diseased subjects while minimizing bias is of epidemiologic importance. We estimate essentially non-parametric piecewise constant hazards and smooth them, and allow for time varying covariates and segment of the night comparisons. The Bayesian Poisson regression is justified through a re-derivation of a classical algebraic likelihood equivalence of Poisson regression with a log(time) offset and survival regression assuming piecewise constant hazards. This relationship allows us to synthesize two methods currently used to analyze sleep transition phenomena: stratified multi-state proportional hazards models and log-linear models with GEE for transition counts. An example data set from the Sleep Heart Health Study is analyzed.