880 resultados para Continuous leakage


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage eCK (CAFL-eCK) model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the CAFL-eCK model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Apples at 24 ± 2 °C were heated in a pilot scale hot air assisted (40 °C) continuous pentagonal microwave system, to evaluate the effectiveness of this treatment on insect mortality (variety Mutsu) and fruit quality (variety Granny Smith). An average temperature of 53.4 ± 1.3 °C at core, bottom and flesh of the apple was recorded at the end of the treatment. One hundred percent mortality of the most tolerant stage of Queensland fruit fly (Bactrocera tryoni, Froggatt) and Jarvis's fruit fly (Bactrocera jarvisi, Tryon), were observed when the Mortality value (M52, equivalent time of isothermal treatment at 52 °C) at the slowest heating point applicable for each experiment was ≥ 50 min and ≥ 37 min, respectively. Results showed that microwave heat treatment is effective for insect disinfestation without any adverse impact on total soluble solids, flesh or peel firmness of the treated apples. The treated apples recorded a significantly higher pH and lower ion leakage than the untreated apples after 3 or 4 weeks. Therefore, the microwave heat treatment has the potential to be developed as an alternative chemical free quarantine treatment against economically significant insect pests. Industrial relevance Hot air assisted microwave heating of fruits and vegetables, is more cost effective compared to vapour heat treatment and ionising radiation for disinfestation of insects. Microwave treatment is environmentally friendly compared to fumigation and chemical treatments. Hot air assisted microwave disinfestation can be performed at farms or centralised pack houses since the capital cost would be comparatively lower than vapour heat or ionising radiation treatments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Incontinentia lactis is a possible predisposing factor for an elevated level of intramammary infection. The goal of the present study was to investigate possible causes of incontinentia lactis in dairy cows. Two farms that differed in breed composition, but that had similar average milk yields were studied: herd A, 28 kg/d, 31 Red Holstein cows; and herd B, 26 kg/d, 16 Brown Swiss cows. Herd A was classified into 2 groups: incontinentia lactis (ILA group) and control, whereas herd B was exclusively a control herd. Milk samples that represented foremilk and the main milk fraction were collected during 4 milking sessions. In addition, milk leakage samples from the ILA group were collected at different time intervals from 0 to 5 h before milking. Measurements of the teat, milk flow, fractions of cisternal and alveolar milk, intramammary pressure, and blood oxytocin pattern also were obtained. The ILA cows did not have differences in fat content between milk leakage and cisternal milk fraction. Milk fat content, however, increased during milking in response to continuous milk ejection (1.95, 1.99, and 4.61% for milk leakage, cisternal, and main milk samples, respectively). Teat canals were 9% shorter in the ILA cows, which showed greater milk yield, peak, and average flow rates. Quarter cisternal milk yield of ILA cows tended to be greater (0.50 vs. 0.23 and 0.28 kg for ILA and controls from herds A and B, respectively), whereas percentages of cistern milk and alveolar milk did not differ from controls. The greater pressure in the ILA group, both before and after manual udder stimulation (ILA: 4.0 and 6.4 kPa; control: 2.0 and 5.0 kPa, respectively), could be an important cause for the leakage. Nevertheless, the increase in IMP that occurred after udder preparation affirms that milk ejection occurred in response to the tactile teat stimulation, but not before the onset of leakage. Blood oxytocin concentration in ILA cows was low until the start of udder preparation and increased in response to the milking stimulus (reaffirming the hypothesis that milk leakage occurred in the absence of milk ejection). In conclusion, milk losses by leakage are likely due to the large amount of cisternal milk, which creates pressure and causes leakage, in the absence of milk ejection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hybrid MIMO Phased-Array Radar (HMPAR) is an emerging technology that combines MIMO (multiple-in, multiple-out) radar technology with phased-array radar technology. The new technology is in its infancy, but much of the theoretical work for this specific project has already been completed and is explored in great depth in [1]. A brief overview of phased-array radar systems, MIMO radar systems, and the HMPAR paradigm are explored in this paper. This report is the culmination of an effort to support research in MIMO and HMPAR utilizing a concept called intrapulse beamscan. Using intrapulse beamscan, arbitrary spatial coverage can be achieved within one MIMO beam pulse. Therefore, this report focuses on designing waveforms for MIMO radar systems with arbitrary spatial coverage using that phenomenon. With intrapulse beamscan, scanning is done through phase-modulated signal design within one pulse rather than phase-shifters in the phased array over multiple pulses. In addition to using this idea, continuous phase modulation (CPM) signals are considered for their desirable peak-to-average ratio property as well as their low spectral leakage. These MIMO waveforms are designed with three goals in mind. The first goal is to achieve flexible spatial coverage while utilizing intrapulse beamscan. As with almost any radar system, we wish to have flexibility in where we send our signal energy. The second goal is to maintain a peak-to-average ratio close to 1 on the envelope of these waveforms, ensuring a signal that is close to constant modulus. It is desired to have a radar system transmit at the highest available power; not doing so would further diminish the already very small return signals. The third goal is to ensure low spectral leakage using various techniques to limit the bandwidth of the designed signals. Spectral containment is important to avoid interference with systems that utilize nearby frequencies in the electromagnetic spectrum. These three goals are realized allowing for limitations of real radar systems. In addition to flexible spatial coverage, the report examines the spectral properties of utilizing various space-filling techniques for desired spatial areas. The space-filling techniques examined include Hilbert/Peano curves and standard raster scans.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Catering to society's demand for high performance computing, billions of transistors are now integrated on IC chips to deliver unprecedented performances. With increasing transistor density, the power consumption/density is growing exponentially. The increasing power consumption directly translates to the high chip temperature, which not only raises the packaging/cooling costs, but also degrades the performance/reliability and life span of the computing systems. Moreover, high chip temperature also greatly increases the leakage power consumption, which is becoming more and more significant with the continuous scaling of the transistor size. As the semiconductor industry continues to evolve, power and thermal challenges have become the most critical challenges in the design of new generations of computing systems. ^ In this dissertation, we addressed the power/thermal issues from the system-level perspective. Specifically, we sought to employ real-time scheduling methods to optimize the power/thermal efficiency of the real-time computing systems, with leakage/ temperature dependency taken into consideration. In our research, we first explored the fundamental principles on how to employ dynamic voltage scaling (DVS) techniques to reduce the peak operating temperature when running a real-time application on a single core platform. We further proposed a novel real-time scheduling method, “M-Oscillations” to reduce the peak temperature when scheduling a hard real-time periodic task set. We also developed three checking methods to guarantee the feasibility of a periodic real-time schedule under peak temperature constraint. We further extended our research from single core platform to multi-core platform. We investigated the energy estimation problem on the multi-core platforms and developed a light weight and accurate method to calculate the energy consumption for a given voltage schedule on a multi-core platform. Finally, we concluded the dissertation with elaborated discussions of future extensions of our research. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Catering to society’s demand for high performance computing, billions of transistors are now integrated on IC chips to deliver unprecedented performances. With increasing transistor density, the power consumption/density is growing exponentially. The increasing power consumption directly translates to the high chip temperature, which not only raises the packaging/cooling costs, but also degrades the performance/reliability and life span of the computing systems. Moreover, high chip temperature also greatly increases the leakage power consumption, which is becoming more and more significant with the continuous scaling of the transistor size. As the semiconductor industry continues to evolve, power and thermal challenges have become the most critical challenges in the design of new generations of computing systems. In this dissertation, we addressed the power/thermal issues from the system-level perspective. Specifically, we sought to employ real-time scheduling methods to optimize the power/thermal efficiency of the real-time computing systems, with leakage/ temperature dependency taken into consideration. In our research, we first explored the fundamental principles on how to employ dynamic voltage scaling (DVS) techniques to reduce the peak operating temperature when running a real-time application on a single core platform. We further proposed a novel real-time scheduling method, “M-Oscillations” to reduce the peak temperature when scheduling a hard real-time periodic task set. We also developed three checking methods to guarantee the feasibility of a periodic real-time schedule under peak temperature constraint. We further extended our research from single core platform to multi-core platform. We investigated the energy estimation problem on the multi-core platforms and developed a light weight and accurate method to calculate the energy consumption for a given voltage schedule on a multi-core platform. Finally, we concluded the dissertation with elaborated discussions of future extensions of our research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces the Corporate Culture Change Cycle: a continuous innovation methodology for transforming the psychological contract in an organisational context. The eight step process is based on the action learning model. The purpose of this methodology is to benchmark the psychological contract against eight changing values of the employment relationship as a basis for facilitating a process of aligning the changing needs of employer and employee. Both the Corporate Culture Change Cycle and the New Employment Relationship Model have been validated in several organisational settings and subsequently refined. This continuous innovation methodology addresses gaps in the psychological contract, change management and continuous innovation research literatures. The approach therefore should be of interest to researchers in these fields of study and from a practical perspective for managers wishing to transform their workplace cultures.