991 resultados para generic key
Resumo:
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.
Resumo:
Both sexes of a new genus and species of Ectinosomatidae (Copepoda, Harpacticoida) from sublittoral sediments collected on the inner continental shelf in Ubatuba, Sao Paulo State (Brazil) are described in detail. Chaulionyx gen. n. (type species: C. paivacarvalhoi sp. n.) differs from all known genera in the presence of a conspicuous bifid spine on the prehensile P1 endopod. It can be differentiated from other genera with a prehensile endopod (Halophytophilus Brian, 1919; Bradyellopsis Brian, 1925; Klieosoma Hicks & Schriever, 1985) by the presence of distinctive subrectangular middorsal pores on the urosomites and the unarmed male sixth legs. The genus Lineosoma Wells, 1965 is recognized as a paraphyletic taxon and relegated to a junior subjective synonym of Noodtiella Wells, 1965. Arenosetella pectinata Chappuis, 1954a is removed from its floating position in Ectinosomoides Nicholls, 1945, transferred to the genus Noodtiella as N. pectinata comb. n. and considered the senior subjective synonym of N. toukae Mitwally & Montagna, 2001. Dichotomous keys are provided for the identification of the 18 valid species of Noodtiella and the 21 valid genera of the family Ectinosomatidae. Halophytophilus aberrans Wells & Rao, 1987 is placed species incertae sedis in the family.
Resumo:
Eriocaulaceae é uma família pantropical com dez gêneros e cerca de 1.400 espécies, com centro de diversidade no Novo Mundo, especialmente no Brasil. A última revisão da família foi publicada há mais de 100 anos, e até recentemente, as relações genéricas e infra-genéricas ainda eram pouco resolvidas. Entretanto, tem havido nos últimos 30 anos, um grande esforço por parte de pesquisadores brasileiros para preencher as lacunas existentes, utilizando caracteres morfológicos e anatômicos, complementados por dados adicionais de diferentes fontes, como palinologia, química, embriologia, genética de populações, citologia e, mais recentemente, estudos de filogenia molecular. Tal conjunto de dados tem levado a uma re-avaliação do relacionamento filogenético dentro da familia. Neste trabalho são apresentados novos dados para as regiões de ITS e trnL-F, analisadas separadamente e em combinação, usando máxima parcimônia e inferência Bayesiana. Os dados obtidos confirmam resultados já publicados, e mostram que muitos caracteres tradicionalmente usados para diferenciação e circunscrição dos gêneros dentro da família são homoplásicos. Uma nova descrição e chave genérica para a família, utilizando caracteres de várias fontes são apresentadas, refletindo a taxonomia atual das Eriocaulaceae.
Resumo:
Compsodactylus new genus and C. scabrosus new species are described and C. martinezi (Frey, 1972) new combination and C. parvulus (Frey, 1970) new combination are redescribed and transferred from Dicrania LePeletier & Audinet-Serville, 1828. The new genus is placed in Macrodactylini (Coleoptera: Scarabaeidae: Melolonthinae) and occurs in the South American Andean and Preandean regions. A key to the species, modification on the recent generic key to Macrodactylini, and distributional map are presented.
Resumo:
The pantropical family Eriocaulaceae includes ten genera and c. 1,400 species, with diversity concentrated in the New World. The last complete revision of the family was published more than 100 years ago, and until recently the generic and infrageneric relationships were poorly resolved. However, a multi-disciplinary approach over the last 30 years, using morphological and anatomical characters, has been supplemented with additional data from palynology, chemistry, embryology, population genetics, cytology and, more recently, molecular phylogenetic studies. This led to a reassessment of phylogenetic relationships within the family. In this paper we present new data for the ITS and trnL-F regions, analysed separately and in combination, using maximum parsimony and Bayesian inference. The data confirm previous results, and show that many characters traditionally used for differentiating and circumscribing the genera within the family are homoplasious. A new generic key with characters from various sources and reflecting the current taxonomic changes is presented.
Resumo:
This survey was conducted in developing a final specialized examination for all arts therapists in Switzerland by the Council of Swiss Arts Therapy Associations (CSATA). Forty-eight generic key competencies (GKC) were sent to all 1235 arts therapists in five different disciplines in Switzerland (response 47.5%) and to 384 referring professionals and employers (RPE) listed by therapists (response 42%). The mean importance of GKC was rated high (4 points of 5) by practitioners and RPE. Different opinions on importance of GKC in disciplines included artistic ability and psychotherapeutic relative to medical orientation. The training of competencies was rated lower by practitioners (3.48 points) and different in the eight competence categories and five disciplines. Areas of weak training were identified. The performance of GKC was rated by referring professionals equally to its importance (mean +0.3 points) and showed a good understanding of competencies by RPE. Judging of performance was difficult for RPE in more than 20% of items. The results provide criteria for detailed outcome assessments and the advancement of a final examination for arts therapists in Switzerland.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.
Resumo:
We propose a generic three-pass key agreement protocol that is based on a certain kind of trapdoor one-way function family. When specialized to the RSA setting, the generic protocol yields the so-called KAS2 scheme that has recently been standardized by NIST. On the other hand, when specialized to the discrete log setting, we obtain a new protocol which we call DH2. An interesting feature of DH2 is that parties can use different groups (e.g., different elliptic curves). The generic protocol also has a hybrid implementation, where one party has an RSA key pair and the other party has a discrete log key pair. The security of KAS2 and DH2 is analyzed in an appropriate modification of the extended Canetti-Krawczyk security model.
Resumo:
Flies of the tribe Muscini (Diptera, Muscidae) are worldwide in distribution and are represented by some 350 species in 18 genera. The present study provides an identification key and diagnoses for all the genera of world Muscini: Biopyrellia Townsend, Curranosia Paterson, Dasyphora Robineau-Desvoidy, Deltotus Seguy, Hennigmyia Peris, Mesembrina Meigen, Mitroplatia Enderlein, Morellia Robineau-Desvoidy, Musca Linnaeus, Myiophaea Enderlein, Neomyia Walker, Neorypellia Pont, Polietes Rondani, Polietina Schnabl & Dziedzicki, Pyrellia Robineau-Desvoidy, Pyrellina Malloch, Sarcopromusca Townsend, Ziminellia Nihei & de Carvalho. Most infrageneric taxa are also represented, namely, the sub-genera of Dasyphora and Morellia. Comments on phylogeny support (whenever pertinent) and the major references containing revisions and regional identification keys to species are provided for each genus and subgenus.
Resumo:
The construction industry is a key national economic component. It tends to be at the forefront of cyclic changes in the Australian economy. It has a significant impact, both directly and indirectly, on the efficiency and productivity of other industries. Moreover it affects everyone to a greater or lesser extent; through its products whether they are manifested in the physical infrastructure that supports the operation of the economy or through the built environment that directly impacts on the quality of life experienced by individuals. In financial terms the industry makes one of the largest contributions to the Australian economy, accounting for 4.7 per cent of GDP 1 which was worth over $30B in 20012. The construction industry is comprised of a myriad of small firms, across several important sectors including, o Residential building, o Commercial building, o Building services, o Engineering, o Infrastructure o Facilities Management o Property Development Each sector is typified by firms that have distinctive characteristics such as the number of employees, size and value of contracts, number of jobs, and so forth. It tends to be the case that firms operating in commercial building are larger than those involved in residential construction. The largest contractors are found in engineering and infrastructure, as well as in the commercial building sub-sectors. However all sectors are characterised by their reliance upon sub-contractors to carry out on-site operations. Professionals from the various design consultant groups operate across all of these sectors. This description masks one of the most significant underlying causes of inefficiency in the construction industry, namely its fragmentation. The Construction Industry chapter of the 2004 Australian Year Book3, published by the Australian Bureau of Statistics unmasks the industry’s fragmented structure, typified by the large number of operating businesses within it, the vast majority of which are small companies employing less than 5 people. It identifies over 190,000 firms, of which over 90 percent employ less than 5 people. At the other end of the spectrum, firms employing 20 or more people account for fractionally more than one percent of businesses in the industry.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
With the increasing growth of cultural events both in Australia and internationally, there has also been an increase in event management studies; in theory and in practice. Although a series of related knowledge and skills required specifically by event managers has already been identified by many researchers (Perry et al., 1996; Getz, 2002 & Silvers et al., 2006) and generic event management models proposed, including ‘project management’ strategies in an event context (Getz, 2007), knowledge gaps still exist in relation to identifying specific types of events, especially for not-for-profit arts events. For events of a largely voluntary nature, insufficient resources are recognised as the most challenging; including finance, human resources and infrastructure. Therefore, the concepts and principles which are adopted by large scale commercial events may not be suitable for not-for-profit arts events aiming at providing professional network opportunities for artists. Building partnerships are identified as a key strategy in developing an effective event management model for this type of event. Using the 2008 World Dance Alliance Global Summit (WDAGS) in Brisbane 13-18 July, as a case study, the level, nature and relationship of key partners are investigated. Data is triangulated from interviews with organisers of the 2008 WDAGS, on-line and email surveys of delegates, participant observation and analysis of formal and informal documents, to produce a management model suited to this kind of event.