990 resultados para Kenneth Schlesinger
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
Mosston & Ashworth‟s Spectrum of Teaching styles was first published in 1966 and is potentially the longest surviving model of teaching within the field of physical education. Its longevity and influence is surely testament to its value and influence. Many tools have also been developed through the years based on The Spectrum of Teaching Styles. In 2005 as part of a doctoral study, this tool was developed by the author, Dr Edwards and Dr Ashworth for researchers and teachers to identify which teaching styles were being utilised from The Spectrum when teaching physical education. It could also be utilised for self-assessment of the teaching styles and individual uses, or those who work with Physical Education Teacher Education courses. The development of this tool took approximately 4 months, numerous emails and meetings. This presentation will outline this process, along with the reasons why such a tool was developed and the differences between it and others like it.
CTA1-DD is an effective adjuvant for targeting anti-chlamydial immunity to the murine genital mucosa
Resumo:
Chlamydia trachomatis is a significant human pathogen with potentially severe disease sequelae in the genital tract, including infertility. A successful vaccine will need to effectively target immunity to the genital mucosa. Intranasal immunisation with cholera toxin (CT) can target immunity to the genital tract, but has the potential to cause neurological side effects. CTA1-DD is a non-toxic potent mucosal adjuvant which combines the enzymatic properties of CT, with a B cell targeting moiety. Here, we demonstrate that intranasal immunisation with CTA1-DD and chlamydial Major Outer Membrane Protein (MOMP) results in the induction of neutralising systemic and mucosal antibodies, and reduces the level of chlamydial shedding following intravaginal challenge with Chlamydia muridarum. Thus, CTA1-DD is an effective adjuvant for vaccine development against Chlamydia trachomatis, and possibly also a range of other genital pathogens.
Resumo:
Background. We investigated the likely impact of vaccines on the prevalence of and morbidity due to Chlamydia trachomatis (chlamydia) infections in heterosexual populations. Methods.An individual‐based mathematical model of chlamydia transmission was developed and linked to the infection course in chlamydia‐infected individuals. The model describes the impact of a vaccine through its effect on the chlamydial load required to infect susceptible individuals (the “critical load”), the load in infected individuals, and their subsequent infectiousness. The model was calibrated using behavioral, biological, and clinical data. Results.A fully protective chlamydia vaccine administered before sexual debut can theoretically eliminate chlamydia epidemics within 20 years. Partially effective vaccines can still greatly reduce the incidence of chlamydia infection. Vaccines should aim primarily to increase the critical load in susceptible individuals and secondarily to decrease the peak load and/or the duration of infection in vaccinated individuals who become infected. Vaccinating both sexes has a beneficial impact on chlamydia‐related morbidity, but targeting women is more effective than targeting men. Conclusions.Our findings can be used in laboratory settings to evaluate vaccine candidates in animal models, by regulatory bodies in the promotion of candidates for clinical trials, and by public health authorities in deciding on optimal intervention strategies.
Resumo:
Problem: Chlamydia trachomatis is the most common sexually transmitted infection worldwide. While infection in females requires a Th1 response for clearance, such a response in males may disrupt the immune privileged nature of the male reproductive tract, potentially contributing to infertility. Method of study: We investigated the role of IgA in protection against an intrapenile Chlamydia muridarum infection of C57BL/6 and pIgR−/− mice. Results: Here, we show that the poly immunoglobulin receptor is the main pathway for IgA transport into the male reproductive tract. The high levels of IgA seen in prostatic fluid of wild-type mice correlate with reduction in chlamydial infection both in vitro and in vivo. Conclusion: These findings indicate that a Chlamydia vaccine that induces neutralizing IgA in the prostate will aid in the protection against infection in males.
Resumo:
Healing large bone defects and non-unions remains a significant clinical problem. Current treatments, consisting of auto and allografts, are limited by donor supply and morbidity, insufficient bioactivity and risk of infection. Biotherapeutics, including cells, genes and proteins, represent promising alternative therapies, but these strategies are limited by technical roadblocks to biotherapeutic delivery, cell sourcing, high cost, and regulatory hurdles. In the present study, the collagen-mimetic peptide, GFOGER, was used to coat synthetic PCL scaffolds to promote bone formation in critically-sized segmental defects in rats. GFOGER is a synthetic triple helical peptide that binds to the [alpha]2[beta]1 integrin receptor involved in osteogenesis. GFOGER coatings passively adsorbed onto polymeric scaffolds, in the absence of exogenous cells or growth factors, significantly accelerated and increased bone formation in non-healing femoral defects compared to uncoated scaffolds and empty defects. Despite differences in bone volume, no differences in torsional strength were detected after 12 weeks, indicating that bone mass but not bone quality was improved in this model. This work demonstrates a simple, cell/growth factor-free strategy to promote bone formation in challenging, non-healing bone defects. This biomaterial coating strategy represents a cost-effective and facile approach, translatable into a robust clinical therapy for musculoskeletal applications.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
Background Colorectal cancer survivors may suffer from a range of ongoing psychosocial and physical problems that negatively impact on quality of life. This paper presents the study protocol for a novel telephone-delivered intervention to improve lifestyle factors and health outcomes for colorectal cancer survivors. Methods/Design Approximately 350 recently diagnosed colorectal cancer survivors will be recruited through the Queensland Cancer Registry and randomised to the intervention or control condition. The intervention focuses on symptom management, lifestyle and psychosocial support to assist participants to make improvements in lifestyle factors (physical activity, healthy diet, weight management, and smoking cessation) and health outcomes. Participants will receive up to 11 telephone-delivered sessions over a 6 month period from a qualified health professional or 'health coach'. Data collection will occur at baseline (Time 1), post-intervention or six months follow-up (Time 2), and at 12 months follow-up for longer term effects (Time 3). Primary outcome measures will include physical activity, cancer-related fatigue and quality of life. A cost-effective analysis of the costs and outcomes for survivors in the intervention and control conditions will be conducted from the perspective of health care costs to the government. Discussion The study will provide valuable information about an innovative intervention to improve lifestyle factors and health outcomes for colorectal cancer survivors.
Resumo:
The rhetoric of the pedagogic discourses of landscape architectural students and interior design students is described as part of a doctoral study undertaken to document practices and orientations prior to cross-disciplinary collaboration. We draw on the theoretical framework of Basil Bernstein, an educational sociologist, and the rhetorical method of Kenneth Burke, a literary dramatist, to study the grammars of ‘landscape’ representation employed within these disciplinary examples. We investigate how prepared final year students are for working in a cross-disciplinary manner. The discursive interactions of their work, as illustrated by four examples of drawn images and written text, are described. Our findings suggest that we need to concern ourselves aspects of our pedagogic discourse that brings uniqueness and value to our disciplines ,as well as that shared discourses between disciplines.
Resumo:
The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of operations in Fpk dominates the complexity of the operations that occur in the lower degree subfields. Consequently, full extension field operations have the greatest effect on the runtime of Miller’s algorithm. Many recent optimizations in the literature have focussed on improving the overall operation count by presenting new explicit formulas that reduce the number of subfield operations encountered throughout an iteration of Miller’s algorithm. Unfortunately, almost all of these improvements tend to suffer for larger embedding degrees where the expensive extension field operations far outweigh the operations in the smaller subfields. In this paper, we propose a new way of carrying out Miller’s algorithm that involves new explicit formulas which reduce the number of full extension field operations that occur in an iteration of the Miller loop, resulting in significant speed ups in most practical situations of between 5 and 30 percent.
Resumo:
Miller’s algorithm for computing pairings involves perform- ing multiplications between elements that belong to different finite fields. Namely, elements in the full extension field Fpk are multiplied by elements contained in proper subfields F pk/d , and by elements in the base field Fp . We show that significant speedups in pairing computations can be achieved by delaying these “mismatched” multiplications for an optimal number of iterations. Importantly, we show that our technique can be easily integrated into traditional pairing algorithms; implementers can exploit the computational savings herein by applying only minor changes to existing pairing code.
Resumo:
This paper examines the algebraic cryptanalysis of small scale variants of the LEX-BES. LEX-BES is a stream cipher based on the Advanced Encryption Standard (AES) block cipher. LEX is a generic method proposed for constructing a stream cipher from a block cipher, initially introduced by Biryukov at eSTREAM, the ECRYPT Stream Cipher project in 2005. The Big Encryption System (BES) is a block cipher introduced at CRYPTO 2002 which facilitates the algebraic analysis of the AES block cipher. In this paper, experiments were conducted to find solution of the equation system describing small scale LEX-BES using Gröbner Basis computations. This follows a similar approach to the work by Cid, Murphy and Robshaw at FSE 2005 that investigated algebraic cryptanalysis on small scale variants of the BES. The difference between LEX-BES and BES is that due to the way the keystream is extracted, the number of unknowns in LEX-BES equations is fewer than the number in BES. As far as the author knows, this attempt is the first at creating solvable equation systems for stream ciphers based on the LEX method using Gröbner Basis computations.
Resumo:
To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on lin- ear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciphers, an example of stream ciphers based on dynamic tables, and inves- tigate its implications to potential algebraic attacks on the cipher. This is, to our knowledge, the first pa- per that evaluates the security of RC4 against alge- braic attacks through providing a full set of equations that describe the complex word manipulations in the system. For an arbitrary word size, we derive alge- braic representations for the three main operations used in RC4, namely state extraction, word addition and state permutation. Equations relating the inter- nal states and keystream of RC4 are then obtained from each component of the cipher based on these al- gebraic representations, and analysed in terms of their contributions to the security of RC4 against algebraic attacks. Interestingly, it is shown that each of the three main operations contained in the components has its own unique algebraic properties, and when their respective equations are combined, the resulting system becomes infeasible to solve. This results in a high level of security being achieved by RC4 against algebraic attacks. On the other hand, the removal of an operation from the cipher could compromise this security. Experiments on reduced versions of RC4 have been performed, which confirms the validity of our algebraic analysis and the conclusion that the full RC4 stream cipher seems to be immune to algebraic attacks at present.