965 resultados para auction aggregation


Relevância:

60.00% 60.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bid opening in e-auction is efficient when a homomorphic secret sharing function is employed to seal the bids and homomorphic secret reconstruction is employed to open the bids. However, this high efficiency is based on an assumption: the bids are valid (e.g., within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunately, validity verification of the bids is ignored in the auction schemes employing homomorphic secret sharing (called homomorphic auction in this paper). In this paper, an attack against the homomorphic auction in the absence of bid validity check is presented and a necessary bid validity check mechanism is proposed. Then a batch cryptographic technique is introduced and applied to improve the efficiency of bid validity check.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Instead of the costly encryption algorithms traditionally employed in auction schemes, efficient Goldwasser-Micali encryption is used to design a new sealed-bid auction. Multiplicative homomorphism instead of the traditional additive homomorphism is exploited to achieve security and high efficiency in the auction. The new scheme is the currently known most efficient non-interactive sealed-bid auction with bid privacy.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The sale of residential property by auction is a preferred sale method by real estate agents, but not always preferred by some vendors and most residential property buyers. In many residential property markets, the performance and measure of residential property market activity is based on the number of properties offered for sale by auction, auction clearance rates and the number of properties sold prior to auction. However, in many specific residential property markets, sale by auction may not be the preferred or supported method of sale. This paper will review the type of residential property sale within the Sydney residential property market and track the auction sales and clearance rates for Sydney over the past 5 months and compare these results in relation to clearance rates, passed in sales, and properties sold prior to auction This will provide a breakdown of real estate agency sale practice over a large metropolitan region to determine the impact of geographic location and socio-economic factors on the auction of residential property. In addition the paper will analyse the weekly auction sales in the Sydney residential property market to determine what areas of Sydney have the greatest number of house auctions and the performance of the auctions in relation location and socio economic factors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ticagrelor is an orally active ADP P2Y12 receptor antagonist in development by AstraZeneca plc for the reduction of recurrent ischemic events in patients with acute coronary syndromes (ACS). Prior to the development of ticagrelor, thienopyridine compounds, such as clopidogrel, were the focus of research into therapies for ACS. Although the thienopyridines are effective platelet aggregation inhibitors, they are prodrugs and, consequently, exert a slow onset of action. In addition, the variability in inter-individual metabolism of thienopyridine prodrugs has been associated with reduced efficacy in some patients. Ticagrelor is not a prodrug and exhibits a more rapid onset of action than the thienopyridine prodrugs. In clinical trials conducted to date, ticagrelor was a potent inhibitor of ADP-induced platelet aggregation and demonstrated effects that were comparable to clopidogrel. In a phase II, short-term trial, the bleeding profile of participants treated with ticagrelor was similar to that obtained with clopidogrel; however, an increased incidence of dyspnea was observed - an effect that has not been reported with the thienopyridines. Considering the occurrence of dyspnea, and the apparent non-superiority of ticagrelor to clopidogrel, it is difficult to justify a clear benefit to the continued development of ticagrelor. Outcomes from an ongoing phase III trial comparing ticagrelor with clopidogrel in 18,000 patients with ACS are likely to impact on the future development of ticagrelor.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The development of research data management infrastructure and services and making research data more discoverable and accessible to the research community is a key priority at the national, state and individual university level. This paper will discuss and reflect upon a collaborative project between Griffith University and the Queensland University of Technology to commission a Metadata Hub or Metadata Aggregation service based upon open source software components. It will describe the role that metadata aggregation services play in modern research infrastructure and argue that this role is a critical one.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.