781 resultados para watermarking protocol
Resumo:
We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on human identification protocols. The attack is an application of Coppersmith’s baby-step giant-step algorithm on human identification protcols. Under this attack, the achievable security of some of the best candidates for human identification protocols in the literature is further reduced. We show that our protocol preserves similar usability while achieves better security than these protocols. A comprehensive security analysis is provided which suggests parameters guaranteeing desired levels of security.
Resumo:
Background Preliminary research shows ginger may be an effective adjuvant treatment for chemotherapy-induced nausea and vomiting but significant limitations need to be addressed before recommendations for clinical practice can be made. Methods/Design In a double–blinded randomised-controlled trial, chemotherapy-naïve patients will be randomly allocated to receive either 1.2 g of a standardised ginger extract or placebo per day. The study medication will be administrated as an adjuvant treatment to standard anti-emetic therapy and will be divided into four capsules per day, to be consumed approximately every 4 hours (300 mg per capsule administered q.i.d) for five days during the first three cycles of chemotherapy. Acute, delayed, and anticipatory symptoms of nausea and vomiting will be assessed over this time frame using a valid and reliable questionnaire, with nausea symptoms being the primary outcome. Quality of life, nutritional status, adverse effects, patient adherence, cancer-related fatigue, and CINV-specific prognostic factors will also be assessed. Discussion Previous trials in this area have noted limitations. These include the inconsistent use of standardized ginger formulations and valid questionnaires, lack of control for anticipatory nausea and prognostic factors that may influence individual CINV response, and the use of suboptimal dosing regimens. This trial is the first to address these issues by incorporating multiple unique additions to the study design including controlling for CINV-specific prognostic factors by recruiting only chemotherapy-naïve patients, implementing a dosing schedule consistent with the pharmacokinetics of oral ginger supplements, and independently analysing ginger supplements before and after recruitment to ensure potency. Our trial will also be the first to assess the effect of ginger supplementation on cancer-related fatigue and nutritional status. Chemotherapy-induced nausea and vomiting are distressing symptoms experienced by oncology patients; this trial will address the significant limitations within the current literature and in doing so, will investigate the effect of ginger supplementation as an adjuvant treatment in modulating nausea and vomiting symptoms. Trial registration
Resumo:
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.
Resumo:
Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.
Resumo:
The first generation e-passport standard is proven to be insecure and prone to various attacks. To strengthen, the European Union (EU) has proposed an Extended Access Control (EAC) mechanism for e-passports that intends to provide better security in protecting biometric information of the e-passport bearer. But, our analysis shows, the EU proposal fails to address many security and privacy issues that are paramount in implementing a strong security mechanism. In this paper we propose an on-line authentication mechanism for electronic passports that addresses the weakness in existing implementations, of both The International Civil Aviation Organisation (ICAO) and EU. Our proposal utilises ICAO PKI implementation, thus requiring very little modifications to the existing infrastructure which is already well established.
Resumo:
MicroRNAs (miRNAs) are a class of small non-coding RNAs with a critical role in development and environmental responses. Efficient and reliable detection of miRNAs is an essential step towards understanding their roles in specific cells and tissues. However, gel-based assays currently used to detect miRNAs are very limited in terms of throughput, sensitivity and specificity. Here we provide protocols for detection and quantification of miRNAs by RT-PCR. We describe an end-point and real-time looped RT-PCR procedure and demonstrate detection of miRNAs from as little as 20 pg of plant tissue total RNA and from total RNA isolated from as little as 0.1 l of phloem sap. In addition, we have developed an alternative real-time PCR assay that can further improve specificity when detecting low abundant miRNAs. Using this assay, we have demonstrated that miRNAs are differentially expressed in the phloem sap and the surrounding vascular tissue. This method enables fast, sensitive and specific miRNA expression profiling and is suitable for facilitation of high-throughput detection and quantification of miRNA expression.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient
Resumo:
Background Few cancers pose greater challenges than head and neck (H&N) cancer. Residual effects following treatment include body image changes, pain, fatigue and difficulties with appetite, swallowing and speech. Depression is a common comorbidity. There is limited evidence about ways to assist patients to achieve optimal adjustment after completion of treatment. In this study, we aim to examine the effectiveness and feasibility of a model of survivorship care to improve the quality of life of patients who have completed treatment for H&N cancer. Methods This is a preliminary study in which 120 patients will be recruited. A prospective randomised controlled trial of the H&N Cancer Survivor Self-management Care Plan (HNCP) involving pre- and post-intervention assessments will be used. Consecutive patients who have completed a defined treatment protocol for H&N cancer will be recruited from two large cancer services and randomly allocated to one of three study arms: (1) usual care, (2) information in the form of a written resource or (3) the HNCP delivered by an oncology nurse who has participated in manual-based training and skill development in patient self-management support. The trained nurses will meet patients in a face-to-face interview lasting up to 60 minutes to develop an individualised HNCP, based on principles of chronic disease self-management. Participants will be assessed at baseline, 3 and 6 months. The primary outcome measure is quality of life. The secondary outcome measures include mood, self-efficacy and health-care utilisation. The feasibility of implementing this intervention in routine clinical care will be assessed through semistructured interviews with participating nurses, managers and administrators. Interviews with patients who received the HNCP will explore their perceptions of the HNCP, including factors that assisted them in achieving behavioural change. Discussion In this study, we aim to improve the quality of life of a patient population with unique needs by means of a tailored self-management care plan developed upon completion of treatment. Delivery of the intervention by trained oncology nurses is likely to be acceptable to patients and, if successful, will be a model of care that can be implemented for diverse patient populations.
Resumo:
Review question/objective What are the most effective information sharing strategies used to reduce anxiety in families of patients undergoing elective surgery? This review seeks to synthesize the best available evidence in relation to the most effective information-sharing intervention to reduce anxiety for families waiting for patients undergoing an elective surgical procedure. The specific objectives are to review the effectiveness of evidence of interventions designed to reduce the anxiety of families waiting whilst their loved one undergoes a surgical intervention. A variety of interventions exist and include surgical nurse liaison services, intraoperative reporting either by face-to-face or telephone delivery, informational cards, visual information screens, and intraoperative paging devices for families. Inclusion criteria Types of participants All studies of family members over 18 years of age waiting for patients undergoing an elective surgical procedure will be included, including those waiting for both adult and paediatric patients. Studies of families waiting for other patient populations, eg emergency surgery, chemotherapy or intensive care patients will be excluded. Types of intervention(s)/phenomena of interest All information-sharing Interventions for families of patients undergoing an elective surgical procedure will be included, including but not limited to: surgical nurse liaison services, in-person intraoperative reporting, visual information screens, paging devices, informational cards and telephone delivery of intraoperative progress reports. Interventions that take place during the intraoperative phase of care only will be included in the review. Preadmission information sharing interventions will be excluded. Types of outcomes The outcomes of interest include: Primary outcome: the level of anxiety amongst family members or close relatives whilst waiting for patients undergoing surgery, as measured by a validated instrument (such as the S-Anxiety portion of the State-Trait Anxiety Inventory).4 Secondary outcomes: family satisfaction and other measurements that may be considered indicators of stress and anxiety, such as mean arterial pressure (MAP) and heart rate.
Resumo:
Aim To evaluate emergency nurse practitioner service effectiveness on outcomes related to quality of care and service responsiveness. Background Increasing service pressures in the emergency setting have resulted in the adoption of service innovation models; the most common and rapidly expanding of these is the emergency nurse practitioner. The delivery of high quality patient care in the emergency department is one of the most important service indicators to be measured in health services today. The rapid uptake of emergency nurse practitioner service in Australia has outpaced the capacity to evaluate this model in outcomes related to safety and quality of patient care. Design Pragmatic randomized controlled trial at one site with 260 participants. Methods This protocol describes a definitive prospective randomized controlled trial, which will examine the impact of emergency nurse practitioner service on key patient care and service indicators. The study control will be standard emergency department care. The intervention will be emergency nurse practitioner service. The primary outcome measure is pain score reduction and time to analgesia. Secondary outcome measures are waiting time, number of patients who did not wait, length of stay in the emergency department and representations within 48 hours. Discussion Scant research enquiry evaluating emergency nurse practitioner service on patient effectiveness and service responsiveness exists currently. This study is a unique trial that will test the effectiveness of the emergency nurse practitioner service on patients who present to the emergency department with pain. The research will provide an opportunity to further evaluate emergency nurse practitioner models of care and build research capacity into the workforce.
Resumo:
Background In 2002/03 the Queensland Government responded to high rates of alcohol-related harm in discrete Indigenous communities by implementing alcohol management plans (AMPs), designed to include supply and harm reduction and treatment measures. Tighter alcohol supply and carriage restrictions followed in 2008 following indications of reductions in violence and injury. Despite the plans being in place for over a decade, no comprehensive independent review has assessed to what level the designed aims were achieved and what effect the plans have had on Indigenous community residents and service providers. This study will describe the long-term impacts on important health, economic and social outcomes of Queensland’s AMPs. Methods/Design The project has two main studies, 1) outcome evaluation using de-identified epidemiological data on injury, violence and other health and social indicators for across Queensland, including de-identified databases compiled from relevant routinely-available administrative data sets, and 2) a process evaluation to map the nature, timing and content of intervention components targeting alcohol. Process evaluation will also be used to assess the fidelity with which the designed intervention components have been implemented, their uptake and community responses to them and their perceived impacts on alcohol supply and consumption, injury, violence and community health. Interviews and focus groups with Indigenous residents and service providers will be used. The study will be conducted in all 24 of Queensland’s Indigenous communities affected by alcohol management plans. Discussion This evaluation will report on the impacts of the original aims for AMPs, what impact they have had on Indigenous residents and service providers. A central outcome will be the establishment of relevant databases describing the parameters of the changes seen. This will permit comprehensive and rigorous surveillance systems to be put in place and provided to communities empowering them with the best credible evidence to judge future policy and program requirements for themselves. The project will inform impending alcohol policy and program adjustments in Queensland and other Australian jurisdictions. The project has been approved by the James Cook University Human Research Ethics Committee (approval number H4967 & H5241).
Resumo:
The 1967 Protocol Relating to the Status of Refugees has been described as an unnecessary addendum to the 1951 Convention Relating to the Status of Refugees. However, if the 1967 Protocol was superfluous, why did the United Nations High Commissioner for Refugees in the early 1960s insist on its development? This article seeks to establish that the 1967 Protocol was originally intended to encompass the broader concerns of African and Asian states concerning refugee populations in their region. However, the political influence upon the development of international refugee law radically altered the UNHCR's endeavour to make the 1951 Convention universally accessible.
Resumo:
Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets (CPN) to create an executable model representation of DNP3 protocol. The model facilitates the analysis of the protocol to ensure that the protocol will behave as expected. Also, we illustrate how to verify and validate the behaviour of the protocol, using the CPN model and the corresponding state space tool to determine if there are insecure states. With this approach, we were able to identify a Denial of Service (DoS) attack against the DNP3 protocol.