WorldWideScience

Sample records for public key certificate-based

  1. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    OpenAIRE

    Yang Lu; Jiguo Li

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certific...

  2. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    Science.gov (United States)

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  3. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  4. Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Fa-gen; GAO Jun-tao; LIU Shuang-gen; HU Yu-pu

    2006-01-01

    This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).

  5. 空间信息网基于证书的混合式公钥基础设施%Certificate-based hybrid public key infrastructure for space information networks

    Institute of Scientific and Technical Information of China (English)

    任方; 马建峰; 郝选文

    2012-01-01

    考察了由卫星和接入节点所构成的分层式空间信息网模型,首次提出了一种适用于该网络模型的基于证书的公钥基础设施。该模型中作为核心网络的卫星层采用分布式CA管理证书,而其他节点作为接入节点,其证书管理采用集中式CA。该模型具有很强的可扩展性和一定的安全性,适用于空间信息网复杂而多变的环境。%With the development of space communication technologies, security issues in space information networks become increasingly important. However, there has been no good solution to this problem in satellite networks. This paper investigates the layered model of space information networks, which consist infrastructure suitable for of satellites and access nodes; and proposes a certificate-based public key the this model. In this model, the Certificate Management of satellite layer uses distributed CA, and the Certificate Management of other nodes (as access nodes) uses centralized CA. The proposed mode is highly scalable and has a certain degree of safety. So it is applicable to the complex and changeable environment in space information networks.

  6. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    used trust mechanism. Many studies used certificate-based public key manage- ent. However, they have brought out practical limitations cluding high...certificate-based public key management hemes cited above expose practical limitations, including eeding a centralized trusted CA [25] , high...ent sociability derived from the trust profile availabl a priori as well as dynamic social behavior measure by the number of nodes that a node

  7. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  8. A New Efficient Certificate-Based Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yichen; LI Jiguo; WANG Zhiwei; YAO Wei

    2015-01-01

    Certificate-based cryptography is a new kind of public key algorithm, which combines the merits of traditional Public key infrastructure (PKI) and identity-based cryptography. It removes the inherent key escrow problem in the identity-based cryptography and eliminates the certificate revocation problem and third-party queries in the traditional PKI. In this paper, we propose an effi-cient certificate-based signature scheme based on bilinear pairings. Under the strong security model of certificate-based signature scheme, we prove that our scheme is exis-tentially unforgeable against adaptive chosen message and identity attacks in the random oracle. In our scheme, only two pairing operations are needed in the signing and ver-ification processes. Compared with some certificate-based signature schemes from bilinear pairings, our scheme en-joys more advantage in computational cost and communi-cational cost.

  9. An investigation of DUA caching strategies for public key certificates

    Energy Technology Data Exchange (ETDEWEB)

    Cheung, T.C.

    1993-11-01

    Internet Privacy Enhanced Mail (PEM) provides security services to users of Internet electronic mail. PEM is designed with the intention that it will eventually obtain public key certificates from the X.500 directory service. However, such a capability is not present in most PEM implementations today. While the prevalent PEM implementation uses a public key certificate-based strategy, certificates are mostly distributed via e-mail exchanges, which raises several security and performance issues. In this thesis research, we changed the reference PEM implementation to make use of the X.500 directory service instead of local databases for public key certificate management. The thesis discusses some problems with using the X.500 directory service, explores the relevant issues, and develops an approach to address them. The approach makes use of a memory cache to store public key certificates. We implemented a centralized cache server and addressed the denial-of-service security problem that is present in the server. In designing the cache, we investigated several cache management strategies. One result of our study is that the use of a cache significantly improves performance. Our research also indicates that security incurs extra performance cost. Different cache replacement algorithms do not seem to yield significant performance differences, while delaying dirty-writes to the backing store does improve performance over immediate writes.

  10. Quantum Public-Key Cryptosystem

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-03-01

    Quantum one-way functions play a fundamental role in cryptography because of its necessity for the secure encryption schemes taking into account the quantum computer. In this paper our purpose is to establish a theoretical framework for a candidate of the quantum one-way functions and quantum trapdoor functions based on one-parameter unitary groups. The dynamics of parameterized unitary groups ensure the one-wayness and quantum undistinguishability in different levels, and the physical feasibility are derived from the simultaneous approximation of its infinitesimal generators. Moreover, these special functions are used to construct new cryptosystems-the quantum public-key cryptosystems for encrypting both the classical and quantum information.

  11. Applied public-key steganography

    Science.gov (United States)

    Guillon, Pierre; Furon, Teddy; Duhamel, Pierre

    2002-04-01

    We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a suspicion-free digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the Scalar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stego-system following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.

  12. Quantum Key Distribution Protocol with Private-Public Key

    OpenAIRE

    Serna, Eduin H.

    2009-01-01

    A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.

  13. A threshold key escrow scheme based on public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.

  14. Public-Key Encryption with Delegated Search

    NARCIS (Netherlands)

    Ibraimi, Luan; Nikova, Svetla; Hartel, Pieter; Jonker, Willem

    2011-01-01

    In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message. Bob's company, Carol, cannot scan his email for mali

  15. Quantum walk public-key cryptographic system

    Science.gov (United States)

    Vlachou, C.; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2015-12-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public-key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public key generation and encryption/decryption procedures.

  16. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  17. Security analysis of public key watermarking schemes

    Science.gov (United States)

    Craver, Scott A.; Katzenbeisser, Stefan

    2001-12-01

    Traditional watermarking systems require the complete disclosure of the watermarking key in the watermark verification process. In most systems an attacker is able to remove the watermark completely once the key is known, thus subverting the intention of copyright protection. To cope with this problem, public-key watermarking schemes were proposed that allow asymmetric watermark detection. Whereas a public key is used to insert watermarks in digital objects, the marks can be verified with a private key. Knowledge of this private key does not allow piracy. We describe two public-key watermarking schemes which are similar in spirit to zero-knowledge proofs. The key idea of one system is to verify a watermark in a blinded version of the document, where the scrambling is determined by the private key. A probabilistic protocol is constructed that allows public watermark detection with probability of 1/2; by iteration, the verifier can get any degree of certainty that the watermark is present. The second system is based on watermark attacks, using controlled counterfeiting to conceal real watermark data safely amid data useless to an attacker.

  18. Quantum walks public key cryptographic system

    OpenAIRE

    Vlachou, C; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2016-01-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that th...

  19. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  20. A String-Based Public Key Cryptosystem

    CERN Document Server

    Andrecut, M

    2014-01-01

    Traditional public key cryptography is based on number theory, and suffers from problems such as dealing with very large numbers and large prime numbers, making key creation cumbersome. Here, we propose a new public key cryptosystem based on strings only, which avoids the difficulties of the traditional number theory approach. The security mechanism for generating public and secret keys is ensured by a recursive encoding mechanism embedded in a quasi-commutative-random function, resulted from the composition of a quasi-commutative function with a pseudo-random function. Due to the inherent construction algorithm of the the proposed cryptosystem, the resulted mathematical inversion problem is likely to be harder than the classical discrete logarithm or integer factorization problems. Furthermore, the proposed cryptosystem is immune against the known quantum algorithm attacks.

  1. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  2. Applying Evolutionary Algorithm to Public Key Cryptosystems

    Institute of Scientific and Technical Information of China (English)

    Tu Hang; Li Li; Wu Tao-jun; Li Yuan- xiang

    2003-01-01

    A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi degree parallel evolutionary algorithrn to evaluate synthetically the efficiency and security of the public key cryptography. The model con tributes to designing public key cryptography system too.

  3. Dynamic Threshold Public-Key Encryption

    OpenAIRE

    Delerablée, Cécile; Pointcheval, David

    2008-01-01

    The original publication is available at www.springerlink.com; International audience; This paper deals with threshold public-key encryption which allows a pool of players to decrypt a ciphertext if a given threshold of authorized players cooperate. We generalize this primitive to the dynamic setting, where any user can dynamically join the system, as a possible recipient; the sender can dynamically choose the authorized set of recipients, for each ciphertext; and the sender can dynamically s...

  4. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...

  5. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  6. MOBILE PAYMENTMETHODBASED ON PUBLIC-KEY CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Adnan A. Hnaif

    2015-03-01

    Full Text Available Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash, cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is summarized in three processes: firstly, the authentication process, which involves the authentication phases for the applied customers. Secondly, the member recognition process which tests and ensures the customer membership by the market server. Finally, payment processwhich will be done by ciphering the customer information using public-key encryption cryptosystem (RSA, to be submitted over an insecure network to the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed method. However, to prevent a brute force attack, the choice of the key size becomes crucial.

  7. Secure Digital Certificate Design Based on the Public Key Cryptography Algorithm

    Directory of Open Access Journals (Sweden)

    Zhang Qi ming

    2013-07-01

    Full Text Available     With the popularity of the Internet, more and more people choose online shopping, however, in the case of lacking security measures, there is a great deal of risk on the Internet. to this situation,In response to this situation, this paper presents a digital certificate based on the X.509 standard. This paper uses the C language generation public key algorithm (RSA,Realization of the digital certificate registration, verification and certificate generation process,the identity of certification users can be verified and provide proof of identity on the Internet transactions ,reducing the transaction risks greatly , ensuring the user's property and interests are not infringed.

  8. A New Public-Key Encryption Scheme

    Institute of Scientific and Technical Information of China (English)

    Hai-Bo Tian; Xi Sun; Yu-Min Wang

    2007-01-01

    This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme.As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption,the third version of knowledge of exponent assumption (KEA3).Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2).This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations.The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption.In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.

  9. KeyChains: A Decentralized Public-Key Infrastructure

    Science.gov (United States)

    2006-03-02

    exposed. This problem is easily solved in KeyChains, taking inspiration from existing techniques: certificate expiration, revocation lists and online...the peer. The peer maintains an access control list indicating what operations (key storage, key retrieval, and peer management) are permitted to a...2002, Norfolk, VA, September 2002. [9] http://www.umiacs.umd.edu/˜mmarsh/ CODEX /. [10] A. Datta, M. Hauswirth, and K. Aberer. Beyond ”web of trust

  10. An Inexpensive Device for Teaching Public Key Encryption

    Science.gov (United States)

    Pendegraft, Norman

    2009-01-01

    An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…

  11. Low-Power Public Key Cryptography

    Energy Technology Data Exchange (ETDEWEB)

    BEAVER,CHERYL L.; DRAELOS,TIMOTHY J.; HAMILTON,VICTORIA A.; SCHROEPPEL,RICHARD C.; GONZALES,RITA A.; MILLER,RUSSELL D.; THOMAS,EDWARD V.

    2000-11-01

    This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.

  12. Unconditionally-secure and reusable public-key authentication

    CERN Document Server

    Ioannou, Lawrence M

    2011-01-01

    We present a quantum-public-key identification protocol and show that it is secure against a computationally-unbounded adversary. This demonstrates for the first time that unconditionally-secure and reusable public-key authentication is possible in principle with (pure-state) public keys.

  13. Weak-Keys in Public Key Cryptosystems Based on Discrete Logarithms

    Institute of Scientific and Technical Information of China (English)

    TAI Suiyan; LUO Ping; PENG Xiaoning; WANG Daoshun

    2005-01-01

    The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. The weak-key occurs if the public key is a factor or multiple of the primitive element, in which case the user's private key is not needed but can be obtained based on the character of the public key. An algorithm is presented that can easily test whether there is a weak-key in the cryptosystem. An example is given to show that an attack can be completed for the Elgamal digital signature if a weak-key exists, therefore validating the danger of weak-keys. Methods are given to prevent the generation of these weak-keys.

  14. One-way quantum identity authentication based on public key

    Institute of Scientific and Technical Information of China (English)

    ZHANG XingLan

    2009-01-01

    Based on public key, a quantum identity authenticated (QIA) system is proposed without quantum entanglement. The public key acts as the authentication key of a user. Following the idea of the classical public key infrastructure (PKI), a trusted center of authentication (CA) is involved. The user selects a public key randomly and CA generates a private key for the user according to his public key. When it is necessary to perform QIA, the user sends a sequence of single photons encoded with its private key and a message to CA. According to the corresponding secret key kept by CA, CA performs the unitary operations on the single photon sequence. At last, the receiver can judge whether the user is an impersonator.

  15. Certification-Based Process Analysis

    Science.gov (United States)

    Knight, Russell L.

    2013-01-01

    Space mission architects are often challenged with knowing which investment in technology infusion will have the highest return. Certification-based analysis (CBA) gives architects and technologists a means to communicate the risks and advantages of infusing technologies at various points in a process. Various alternatives can be compared, and requirements based on supporting streamlining or automation can be derived and levied on candidate technologies. CBA is a technique for analyzing a process and identifying potential areas of improvement. The process and analysis products are used to communicate between technologists and architects. Process means any of the standard representations of a production flow; in this case, any individual steps leading to products, which feed into other steps, until the final product is produced at the end. This sort of process is common for space mission operations, where a set of goals is reduced eventually to a fully vetted command sequence to be sent to the spacecraft. Fully vetting a product is synonymous with certification. For some types of products, this is referred to as verification and validation, and for others it is referred to as checking. Fundamentally, certification is the step in the process where one insures that a product works as intended, and contains no flaws.

  16. Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings

    Institute of Scientific and Technical Information of China (English)

    SHAO Zu-hua

    2005-01-01

    An efficient authenticated key agreement protocol is proposed, which makes use of bilinear pairings and selfcertified public keys. Its security is based on the security assumptions of the bilinear Diffie-Hellman problem and the computational Diffie-Hellman problem. Users can choose their private keys independently. The public keys and identities of users can be verified implicitly when the session key being generating in a logically single step. A trusted Key Generation Center is no longer required as in the ID-based authenticated key agreement protocols. Compared with existing authenticated key agreement protocols from pairings, the new proposed protocol is more efficient and secure.

  17. A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2015-01-01

    Full Text Available A digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN. The scheme is founded on the access control scheme on the basis of characteristic expression (named CEB scheme. Data is divided by characteristics and the key for encryption is related to characteristic expression. Only the key matching with characteristic expression can decrypt the data. Meanwhile, three distributed certificate detection methods are designed to prevent the certificate from being misappropriated by hostile anonymous users. When a user starts query, the key access control method can judge whether the query is valid. In this case, the scheme can achieve public certificate of users and effectively protect query privacy as well. The security analysis and experiments show that the proposed scheme is superior in communication overhead, storage overhead, and detection probability.

  18. Security Notions for Quantum Public-Key Cryptography

    OpenAIRE

    Koshiba, Takeshi

    2007-01-01

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to ad...

  19. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  20. Public health - threats, concerns and key actions

    DEFF Research Database (Denmark)

    Czeskleba-Dupont, Rolf

    Public health is discussed departing from priorities related to the precautionary principle with special reference to air pollution from wood burning in individual stoves and the susceptibility of vulnerable groups, i.a. people with genetic predispositions for a lack of detoxifying capacity....

  1. Public health - threats, concerns and key actions

    DEFF Research Database (Denmark)

    Czeskleba-Dupont, Rolf

    Public health is discussed departing from priorities related to the precautionary principle with special reference to air pollution from wood burning in individual stoves and the susceptibility of vulnerable groups, i.a. people with genetic predispositions for a lack of detoxifying capacity....

  2. Public key cryptosystem and a key exchange protocol using tools of non-abelian group

    Directory of Open Access Journals (Sweden)

    H. K. Pathak,

    2010-07-01

    Full Text Available Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a block ofencrypted data. We propose a new public key cryptosystem and a Key Exchange Protocol based on the generalization of discrete logarithm problem using Non-abelian group of block upper triangular matrices of higher order. The proposed cryptosystem is efficient in producing keys of large sizes without the need of large primes. The security of both the systems relies on the difficulty of discrete logarithms over finite fields.

  3. Security Notions for Quantum Public-Key Cryptography

    CERN Document Server

    Koshiba, T

    2007-01-01

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  4. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... the value of the respective function on the internal state of the respective device (namely, on its secret share, internal randomness, and results of intermediate computations). We present distributed public key encryption (DPKE) and distributed identity based encryption (DIBE) schemes that are secure...

  5. Public-key cryptography based on bounded quantum reference frames

    OpenAIRE

    Ioannou, Lawrence M.; Mosca, Michele

    2009-01-01

    We demonstrate that the framework of bounded quantum reference frames has application to building quantum-public-key cryptographic protocols and proving their security. Thus, the framework we introduce can be seen as a public-key analogue of the framework of Bartlett et al. (Phys. Rev. A 70, 032307), where a private shared reference frame is shown to have cryptographic application. The protocol we present in this paper is an identification scheme, which, like a digital signature scheme, is a ...

  6. A Secure Public-key Image Authentication Plan

    Institute of Scientific and Technical Information of China (English)

    YANG Qing; CHEN Ke-fei

    2005-01-01

    Digital watermark can be used for image ownership verification or authentication. In this paper, we propose a new image authentication plan concentrating on its security performance. Digital watermark is first turbo coded, scaled and then processed in wavelet domain. To enhance security level, public key cryptosystem is utilized to replace traditional watermark key. Simulation results are finally given by experiment.

  7. A Survey of Key Technology of Network Public Opinion Analysis

    Directory of Open Access Journals (Sweden)

    Li Su Ying

    2016-01-01

    Full Text Available The internet has become an important base for internet users to make comments because of its interactivity and fast dissemination. The outbreak of internet public opinion has become a major risk for network information security. Domestic and foreign researchers had carried out extensive and in-depth study on public opinion. Fruitful results have achieved in the basic theory research and emergency handling and other aspects of public opinion. But research on the public opinion in China is still in the initial stage, the key technology of the public opinion analysis is still as a starting point for in-depth study and discussion.

  8. A public-key cryptosystem for quantum message transmission

    Science.gov (United States)

    Yang, Li

    2005-01-01

    We present a quantum public-key cryptography protocol for quantum message transmission. The private key of this protocol includes three classical matrices: a generator matrix of a Goppa code, an invertible matrix and a permutation matrix. The public key is product of these three matrices. The encryption and decryption algorithms are merely quantum computations related with the transformations between bases of the quantum registers. The security of this protocol is based on the hypothesis that there is no effective algorithm of NP-complete problem.

  9. LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

    CERN Document Server

    Toorani, Mohsen; 10.1109/ICCS.2008.4737164

    2010-01-01

    The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so suitable for the resource-constrained platforms. The elliptic curve-based approaches as the newer solutions require certain considerations that are not taken into account in the traditional public key infrastructures. The main contribution of this paper is to introduce a Lightweight Public Key Infrastructure (LPKI) for the constrained platforms such as mobile phones. It takes advantages of elliptic curve cryptography and signcryption to decrease the computational costs and communication overheads, and adapting to the constraints. All the computational costs of required validations can be eliminated from end-entities by introduction of a validation authority to th...

  10. Public key infrastructure building trusted applications and web services

    CERN Document Server

    Vacca, John R

    2004-01-01

    OVERVIEW OF PKI TECHNOLOGYPublic Key Infrastructures (PKIs): What Are They?Type of Certificate Authorities (CAS) ServicesPKI StandardsTypes of Vendor and Third-Party CA SystemsProtecting Private KeysCA System AttacksStolen Private Keys: What Can Be Done?Certificate Practice StatementsPKI ReadinessANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURESPKI Design IssuesCost Justification and ConsiderationPKI Standards Design IssuesPKI Architectural Design ConsiderationsIMPLEMENTING PKIRequirementsImplementation ScheduleImplementation CostsPKI PerformanceMANAGING PKIRequesting a CertificateObtaining a

  11. A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups

    CERN Document Server

    Gligoroski, Danilo; Knapskog, Svein Johan

    2008-01-01

    We have designed a new class of public key algorithms based on quasigroup string transformations using a specific class of quasigroups called multivariate quadratic quasigroups (MQQ). Our public key algorithm is a bijective mapping, it does not perform message expansions and can be used both for encryption and signatures. The public key consist of n quadratic polynomials with n variables where n=140, 160, ... . A particular characteristic of our public key algorithm is that it is very fast and highly parallelizable. More concretely, it has the speed of a typical modern symmetric block cipher - the reason for the phrase "A Public Key Block Cipher" in the title of this paper. Namely the reference C code for the 160-bit variant of the algorithm performs decryption in less than 11,000 cycles (on Intel Core 2 Duo -- using only one processor core), and around 6,000 cycles using two CPU cores and OpenMP 2.0 library. However, implemented in Xilinx Virtex-5 FPGA that is running on 249.4 MHz it achieves decryption thro...

  12. Modeling, Simulation and Analysis of Public Key Infrastructure

    Science.gov (United States)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  13. SPEED AND SECURITY ENHANCEMENT THROUGH PUBLIC KEY CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    J.SAIGEETHA

    2010-08-01

    Full Text Available It is true that the transfer of data is essential in the fast developing world. It is equally true that the transfer of data tobe taken place with much security by not giving groom to the intruders. This paper presents the analysis of the security of information with enhanced the speed of encryption and decryption process. This process uses public key cryptography via RSA algorithm with some modification. There are two keys used in RSA algorithm foreffectiveness in the aspect of security one being the public key used for all and the other being the secret key. The implementation is done in the JAVA language and crypt analysis is performed to check the level of protection and speed .

  14. Public Key Infrastructure Increment 2 (PKI Inc 2)

    Science.gov (United States)

    2016-03-01

    Public Key Infrastructure (PKI) is a critical enabling technology for Information Assurance (IA) services to support seamless secure information flows...resources. 6. Integrity of software used within or transmitted over DoD networks (i.e. mobile code,) and the provision of security services within the...Operational Capability IP - Internet Protocol IT - Information Technology KPP - Key Performance Parameter $M - Millions of Dollars MAIS - Major

  15. Public-key Encryption with Registered Keyword Search

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is

  16. Cryptanalysis on a finite automaton public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    戴大为; 吴逵; 张焕国

    1996-01-01

    An attack algorithm is proposed on a finite automaton public key cryptosystem.It is proved that this attack can break FAPKCO in polynomial time.The basic idea can be used in principle to attack other FAPKCs.Therefore,while designing an FAPKC,it must be taken into account whether it is secure or not under this kind of attack.

  17. Public Key Cryptography Based on Ergodic Matrices over Finite Field

    Institute of Scientific and Technical Information of China (English)

    PEI Shihui; ZHAO Hongwei; ZHAO Yongzhe

    2006-01-01

    A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can' be solved with polynomial time algorithm.

  18. Trellis-coded quantization for public-key steganography

    CERN Document Server

    Guelvouit, Gaëtan Le

    2008-01-01

    This paper deals with public-key steganography in the presence of a passive warden. The aim is to hide secret messages within cover-documents without making the warden suspicious, and without any preliminar secret key sharing. Whereas a practical attempt has been already done to provide a solution to this problem, it suffers of poor flexibility (since embedding and decoding steps highly depend on cover-signals statistics) and of little capacity compared to recent data hiding techniques. Using the same framework, this paper explores the use of trellis-coded quantization techniques (TCQ and turbo TCQ) to design a more efficient public-key scheme. Experiments on audio signals show great improvements considering Cachin's security criterion.

  19. Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

    Directory of Open Access Journals (Sweden)

    Rajesh P Singh

    2010-04-01

    Full Text Available In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Ourpublic key algorithm is bijective and can be used for both encryption and signatures

  20. A New Factorization Method to Factorize RSA Public Key Encryption

    Directory of Open Access Journals (Sweden)

    Bhagvant Ram Ambedkar

    2011-11-01

    Full Text Available The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm is based on positive integer N, because each transmitting node generates pair of keys such as public and private. Encryption and decryption of any message depends on N. Where, N is the product of two prime numbers and pair of key generation is dependent on these prime numbers. The factorization of N is very intricate. In this paper a New Factorization method is proposed to obtain the factor of positive integer N. The proposed work focuses on factorization of all trivial and nontrivial integer numbers and requires fewer steps for factorization process of RSA modulus N. The New Factorization method is based on Pollard rho factorization method. Experimental results shown that factorization speed is fast as compare existing methods.

  1. Efficient quantum secure communication with a publicly known key

    Institute of Scientific and Technical Information of China (English)

    Li Chun-Yan; Li Xi-Han; Deng Fu-Guo; Zhou Hong-Yu

    2008-01-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently.

  2. An application of different dioids in public key cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com [Technical University of Sofia, Faculty of Applied Mathematics and Informatics, 8 Kliment Ohridski St., Sofia 1000 (Bulgaria)

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme is presented.

  3. New Public Key Cryptosystems from Combinatorial Group Theory

    Institute of Scientific and Technical Information of China (English)

    TANG Xueming; WANG Xiaofei; HONG Fan; CUI Guohua

    2006-01-01

    External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in the quantum computing epoch. Three hard problems on this new platform, Subgroup Root Problem, Multi-variant Subgroup Root Problem and Subgroup Action Problem are presented and well analyzed, which all have no relations with conjugacy. New secure public key encryption system and key agreement protocol are designed based on these hard problems. The new cryptosystems can be implemented in a general group environment other than in braid or Artin groups.

  4. Key-phrase based classification of public health web pages.

    Science.gov (United States)

    Dolamic, Ljiljana; Boyer, Célia

    2013-01-01

    This paper describes and evaluates the public health web pages classification model based on key phrase extraction and matching. Easily extendible both in terms of new classes as well as the new language this method proves to be a good solution for text classification faced with the total lack of training data. To evaluate the proposed solution we have used a small collection of public health related web pages created by a double blind manual classification. Our experiments have shown that by choosing the adequate threshold value the desired value for either precision or recall can be achieved.

  5. Secure Internet Voting System based on Public Key Kerberos

    Directory of Open Access Journals (Sweden)

    Hussein Khalid Abd-Alrazzq

    2012-03-01

    Full Text Available Electronic voting system is an important tool which allows voters to vote over the Internet without the geographical restrictions with considers important criteria in evaluating electronic voting schemes such as the mobility, democracy, and privacy. In this paper secure remote voting system has been presented. The proposed system uses public key Kerberos which is another form of traditional Kerberos as infrastructure deal with voters. The public key is used in all steps of Kerberos (not only in initial. The proposed system utilizes the advantages of threshold cryptography to prevent anyone to decrypt or sign the ballot alone without agreement all authorities, and use threshold blind signature to prevent discovers the vote or the identity of voter and protect the content of the ballot during casting and provide verifiable and discourages ballot buying.

  6. Review of Lattice-based Public key Cryptography(Russian)

    OpenAIRE

    Usatyuk, V. S.

    2010-01-01

    This article presets a review of the achievements rapidly developing field of cryptography - public-key cryptography based on the lattice theory. Paper contains the necessary basic concepts and the major problems of the lattice theory, as well as together with the description on the benefits of this cryptography class - the properties of the reliability to quantum computers and full homomorphism, the shortcomings of specific implementations.

  7. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-09-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  8. Lower and Upper Bounds for Deniable Public-Key Encryption

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian

    2011-01-01

    the parties to change their internal state to make it look like a given ciphertext decrypts to a message different from what it really decrypts to. Deniable encryption was in this way introduced to allow to deny a message exchange and hence combat coercion. Depending on which parties can be coerced......, the security level, the flavor and the number of rounds of the cryptosystem, it is possible to define a number of notions of deniable encryption. In this paper we prove that there does not exist any non-interactive receiver-deniable cryptosystem with better than polynomial security. This also shows...... that it is impossible to construct a non-interactive bi-deniable public-key encryption scheme with better than polynomial security. Specifically, we give an explicit bound relating the security of the scheme to how efficient the scheme is in terms of key size. Our impossibility result establishes a lower bound...

  9. Error-correcting pairs for a public-key cryptosystem

    Science.gov (United States)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-06-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.

  10. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Science.gov (United States)

    2010-04-19

    ... From the Federal Register Online via the Government Publishing Office GENERAL SERVICES ADMINISTRATION Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property..., identified as Key Largo Beacon Annex Site, Key Largo, FL to the U.S. Fish and Wildlife Service, Department...

  11. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Md. Sarwar Morshed

    2010-01-01

    Full Text Available The Session Initiation Protocol (SIP has become the most predominant protocol for Voice over Internet Protocol (VoIP signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF. Finally we analyze the security aspects of these approaches.

  12. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    CERN Document Server

    Hasib, Abdullah Al; Morshed, Md Sarwar

    2010-01-01

    The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.

  13. Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2012-02-01

    Full Text Available Certificate-based encryption (CBE is a new public key encryption paradigm which combines traditional PKI-based public-key encryption (PKE and identity-based encryption (IBE, and preserves some of their most attractive features. CBE provides an efficient implicit certificate mechanism and allows a periodical update of certificate status. It eliminates third-party queries for the certificate status and simplifies the certificate revocation problem in the traditional PKI, while it solves the key escrow problem and the key distribution problem inherent in IBE. In this paper, we propose a new generic construction of CBE schemes from PKE and IBE, and prove it to be CCA-secure in the standard model. In our construction, we use an efficient one-time simulation-sound adaptive NIZK proof system as the security enhancing building block to guarantee the CCA-security of the generated CBE schemes. When compared to the previous method, the security requirements of the primitive encryption schemes in our construction are much weaker and the performance of the generated CBE schemes from our construction is much more efficient.

  14. A Trusted Centralized Public Key to Secure Border Gateway Protocol

    Directory of Open Access Journals (Sweden)

    Divan Raimagia

    2012-06-01

    Full Text Available The Secure Border Gateway Protocol (S-BGP is used when two different Autonomous System communicate with each other and upon reception of UPDATE from neighbor Autonomous System. A core layer Router in single Autonomous System called BGP speaker first verifies the receiving update and signs the full path with own digital signature and send it to neighbor AS. In Real scenario so many ASes and Routers communicate to each other. So due to several digital signatures mandates, large storage require in router as well as high processor overhead and more time require for sign generation and verification in S-BGP. In this paper, we propose a new approach that less burden on BGP Speaker for verify and generate number of digital signatures using Autonomous System makes trusted through KDC server. The Central KDC Server will send master certificate to validate autonomous system. In this environment each BGP speaker verify only one sign on each update and verify path only between itself and neighbor router. After verification of UPDATE, each BGP speaker sign full path encrypt routing table with neighbor’s public key,

  15. Virtual microscopy and public-key cryptography for Internet telepathology.

    Science.gov (United States)

    Strauss, J S; Felten, C L; Okada, D H; Marchevsky, A M

    1999-01-01

    The Internet is a potentially inexpensive, widely available medium for telepathology, but there are concerns about its reliability and security. Using a digital camera, 41 photomicrographs of transbronchial biopsies, at x 100 optical magnification, were captured and digitized at 2700 x 3400 pixel, 24 bit/pixel resolution. The image files were saved in JPEG format at medium compression, attached to text files with patient information, encrypted for security in the S/MIME format using a digital signature and digital envelope, and transmitted by email. Received email files were decrypted automatically and the images viewed with standard software. Telepathology diagnoses were compared with original interpretations. The images averaged 810 kByte in size. The encryption and decryption did not cause significant delays in overall transmission time and, together with transmission, did not produce noticeable image degradation. The received image files could be viewed in a manner that simulated light microscopy. There was agreement between telepathology and original diagnoses in 92% of the cases. All the discrepancies were due to inadequate area selection because the pathological features of interest were present in histological levels other than those photographed. The use of high-resolution digital photomicrography, the Internet and public-key cryptography offers an effective and relatively inexpensive method of telepathology consultation. The method is best suited for the diagnosis of small biopsy specimens that require the transmission of only a few digital images that represent the majority of the biopsy materials.

  16. 基于证书的多代理签名方案%Certificate-Based Multi-Proxy Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    周才学; 张月; 范明钰

    2014-01-01

    Certificate-based cryptosystem can not only reduce the high cost of public key management, but also solve the key escrow problem. Multi-proxy signature allows an original signer to delegate his signing rights to a proxy group, and only the cooperation of all signers in the proxy group can generate a valid proxy signature. This paper presents a new formal definition and a new security model of certificate-based multi-proxy signature, and proposes a concrete scheme without using bilinear pairings. Based on the discrete logarithm assumption, this paper proves the scheme to be unforgeable in the random oracle model. The efficiency analysis shows that the scheme has higher effi-ciency. At last, this paper gives the application examples.%基于证书的密码体制既能降低公钥管理的高昂费用,又能解决密钥托管问题。多代理签名允许一个原始签名者把他的签名权委托给一群代理签名人,并且只有所有代理签名人合作才能产生有效的代理签名。给出了基于证书的多代理签名的形式化定义和安全模型,并提出了一个不使用双线性对的基于证书的多代理签名方案。在随机预言机模型中,基于离散对数问题假设,对方案进行了不可伪造性的证明。效率分析表明,该方案是高效的。最后,给出了该方案的应用实例。

  17. Disseminated Public-Key Management and Certificate Generation Scheme for MANET

    Directory of Open Access Journals (Sweden)

    Sanjay Kumar Chowlam

    2011-07-01

    Full Text Available In this paper, we first discuss the predominant assail abilities in the mobile ad hoc networks, which have made it much easier to prone to attacks than the traditional wired network. Then we discuss the basic operations of our public-key management scheme: creation of public (and private keys, issuing public-key certificates, storage of certificates, and key authentication by the nodes themselves without the control of any principal authority. More over the public key management scheme serves as an underlying mechanism for both key distribution and establishing security relationships between nodes.

  18. Bit-oriented quantum public-key encryption based on quantum perfect encryption

    Science.gov (United States)

    Wu, Chenmiao; Yang, Li

    2016-08-01

    A bit-oriented quantum public-key encryption scheme is presented. We use Boolean functions as private-key and randomly changed pairs of quantum state and classical string as public-keys. Following the concept of quantum perfect encryption, we prepare the public-key with Hadamard transformation and Pauli transformation. The quantum part of public-keys is various with different classical strings. In contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys. We investigate attack to the private-key and prove that the public-key is a totally mixed state. So the adversary cannot acquire any information about private-key from measurement of the public-key. Then, the attack to encryption is analyzed. Since the trace distance between two different ciphertexts is zero, the adversary cannot distinguish between the two ciphertext states and also obtains nothing about plaintext and private-key. Thus, we have the conclusion that the proposed scheme is information-theoretically secure under an attack of the private-key and encryption.

  19. Argumentation Key to Communicating Climate Change to the Public

    Science.gov (United States)

    Bleicher, R. E.; Lambert, J. L.

    2012-12-01

    Argumentation plays an important role in how we communicate climate change science to the public and is a key component integrated throughout the Next Generation Science Standards. A scientific argument can be described as a disagreement between explanations with data being used to justify each position. Argumentation is social process where two or more individuals construct and critique arguments (Kuhn & Udell, 2003; Nussbaum, 1997). Sampson, Grooms, and Walker's (2011) developed a framework for understanding the components of a scientific argument. The three components start with a claim (a conjecture, conclusion, explanation, or an answer to a research question). This claim must fit the evidence (observations that show trends over time, relationships between variables or difference between groups). The evidence must be justified with reasoning (explains how the evidence supports the explanation and whey it should count as support). In a scientific argument, or debate, the controversy focuses on how data were collected, what data can or should be included, and what inferences can be made based on a set of evidence. Toulmin's model (1969) also includes rebutting or presenting an alternative explanation supported by counter evidence and reasoning of why the alternative is not the appropriate explanation for the question of the problem. The process of scientific argumentation should involve the construction and critique of scientific arguments, one that involves the consideration of alternative hypotheses (Lawson, 2003). Scientific literacy depends as much on the ability to refute and recognize poor scientific arguments as much as it does on the ability to present an effective argument based on good scientific data (Osborne, 2010). Argument is, therefore, a core feature of science. When students learn to construct a sound scientific argument, they demonstrate critical thinking and a mastery of the science being taught. To present a convincing argument in support of

  20. Public engagement with CCS: barriers, key issues and ways forward

    Science.gov (United States)

    Xenias, Dimitrios

    2017-04-01

    Although Carbon Capture and Storage (CCS) is recognised as a crucial transition technology to a low-carbon world, it has not been popular with the public or some governments (e.g. the UK). Also, despite its use in industrial processes for decades, CCS remains and unfamiliar technology for most publics. It is therefore important to foster top-down and bottom-up acceptance of large scale CCS. In an exploratory round of interviews we canvassed the views of British, Dutch, German and Norwegian experts (N=13) with previous experience in public engagement with CCS. They identified barriers and drivers for CCS deployment and public engagement with CCS. Thematic analysis revealed a small number of recurrent issues, including: (a) lack of political leadership on CCS; (b) lack of public knowledge on relevant technologies and (c) difficulty communicating why CCS is necessary. Emphasis on these barriers varied with the level of experts' engagement with the public. More interestingly, although most experts agreed on the importance of public engagement, their views divided between 'why' engage and 'how' best to do this. In a subsequent expert survey (N=99) interview findings were reinforced: public support was seen as important for CCS roll-out (72%), though lower than political support and funding. The survey also showed that local public was expected to experience most risks, while global public will experience most benefits; whereas local business is seen to benefit more than global. Experts were overwhelmingly positive about CCS - risks outweigh benefits, and are confident that CCS will play a major role in climate change mitigation (along with reduced energy demand and renewables). These findings will be expanded on and triangulated in a follow-up public survey which will benefit those involved with public engagement with CCS.

  1. A brief review of revocable ID-based public key cryptosystem

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2016-03-01

    Full Text Available The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem.

  2. A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key

    Institute of Scientific and Technical Information of China (English)

    LI Ji-guo; ZHANG Yi-chen; ZHU Yue-long

    2005-01-01

    A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer.

  3. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  4. Key Performance Indicators of Public Universities Based on Quality Assessment Criteria in Thailand

    Science.gov (United States)

    Sukboonyasatit, Kritsana; Thanapaisarn, Chaiwit; Manmar, Lampang

    2011-01-01

    The research objective was to develop public universities' key performance indicators. Qualitative research and interviews were employed with each public university's senior executive and quality assessors. The sample group was selected by the office of the public sector development commission and Thailand's public universities can be separated…

  5. Public Participation: Do's and Don't's & Key Messages

    NARCIS (Netherlands)

    Astley, T.; Massey, H.

    2005-01-01

    This document has been produced to provide a tool to project managers to enable them to quickly assess whether or not participation is the right thing to do and the key Dos and Donts of participation. An example of a Community Engagement Plan in the UK is discribed.

  6. Writing for Professional Publication. Keys to Academic and Business Success.

    Science.gov (United States)

    Henson, Kenneth T.

    This book provides practical help for people writing for publication, especially for those writing for professional journals or university presses. Chapters cover the following topics: (1) reasons for writing; (2) finding topics; (3) getting started; (4) writing style; (5) organizing articles; (6) using journals, libraries, surveys, and action…

  7. Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-01-01

    Full Text Available Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which form a key pair are used. One key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first key used for encryption. In this paper, we have proposed an improved approach of RSA algorithm using two public key pairs and using some mathematical logic rather than sending one public key d irectly.Because if an attacker has an opportunity of getting the public key componet they can find private key value by brute force search. General Terms: Cryptography, network security

  8. 一种基于PKI的密钥%An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs).Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services.In this paper, we concentrate on the properties of the protocol of Phase 1 IKE.After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI.Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol.The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  9. Key elements for a measurement framework for public sector innovation

    DEFF Research Database (Denmark)

    Bloch, Carter Walter; Lopez-Bassols, Vladimir

    2013-01-01

    This document provides an overview of recent NESTI work on developing guidelines for measuring public sector innovation (PSI). The paper includes an update on various ongoing activities which will contribute to the development of a measurement framework for PSI and outlines a number of areas which...... could be further addressed in a final report. Delegates are invited to discuss the proposals and provide inputs on the next steps of the work, particularly regarding the use of multiple approaches, the scope of the measurement framework, the need for core definitions,and priorities for indicators...

  10. Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext

  11. Public key encryption supporting plaintext equality test and user-specified authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2012-01-01

    In this paper, we investigate a category of public key encryption schemes that supports plaintext equality test and userspecified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext

  12. Sustainability as the key to prioritize investments in public infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Pardo-Bosch, Francesc, E-mail: francesc.pardo@upc.edu [Departament d' Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya - Barcelona Tech. (Spain); Political Science Department, University of California - Berkeley (United States); Aguado, Antonio, E-mail: antonio.aguado@upc.edu [Departament d' Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya - Barcelona Tech. (Spain)

    2016-09-15

    Infrastructure construction, one of the biggest driving forces of the economy nowadays, requires a huge analysis and clear transparency to decide what projects have to be executed with the few resources available. With the aim to provide the public administrations a tool with which they can make their decisions easier, the Sustainability Index of Infrastructure Projects (SIIP) has been defined, with a multi-criteria decision system called MIVES, in order to classify non-uniform investments. This index evaluates, in two inseparable stages, the contribution to the sustainable development of each infrastructure project, analyzing its social, environmental and economic impact. The result of the SIIP allows to decide the order with which projects will be prioritized. The case of study developed proves the adaptability and utility of this tool for the ordinary budget management.

  13. Applications of single-qubit rotations in quantum public-key cryptography

    OpenAIRE

    Nikolopoulos, Georgios M.

    2008-01-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum stat...

  14. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud.

    Science.gov (United States)

    Munisamy, Shyamala Devi; Chokkalingam, Arun

    2015-01-01

    Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  15. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud

    Directory of Open Access Journals (Sweden)

    Shyamala Devi Munisamy

    2015-01-01

    Full Text Available Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider’s premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  16. Breaking the HFEM public key scheme%破解HFEM公钥密码方案

    Institute of Scientific and Technical Information of China (English)

    古春生

    2013-01-01

    To design post-quantum public key cryptography, Zhao, et al presented a novel public key scheme based on the BMQ problem. An equivalent secret key could directly be solved from the public key of their scheme by applying the property of the ergodic matrix over finite field. Thus, the HFEM public key scheme was broken.%  为设计后量子公钥密码,赵永哲等人提出了一种基于BMQ问题新的公钥方案。利用有限域上遍历矩阵的性质,从该方案公钥能够直接求出其等价私钥,从而破解了该HFEM公钥密码方案。

  17. Fast public-key encryption scheme based on Chinese remainder theorem

    Institute of Scientific and Technical Information of China (English)

    Baocang WANG; Yongzhuang WEI; Yupu HU

    2009-01-01

    Traditional public-key cryptosystems suffer from a relatively low encryption/decryption speed, which hampers their applications in resource-constrained environments. A fast public-key cryptosystem is proposed to remedy this drawback. The new algorithm uses Chinese remainder theorem to hide the trapdoor information. The encryption of the system only carries out several modular multiplication operations, and the decryption only needs a modular multiplication and a low-dimensional matrixvector multiplication, which makes the speed of the encryption and the decryption of the scheme very high.The security of the system is based on two difficult number-theoretic problems. The attacker has to solve the integer factorization problem and the simultaneous Diophantine approximation problem simultaneously to recover the secret key from the public key. The proposed cryptosystem is also shown to be secure against lattice attack. The analysis shows that the encryption algorithm is a secure, fast and efficient public-key cryptosystem.

  18. Measuring Public Leadership: Developing Scales for Four Key Public Leadership Roles

    NARCIS (Netherlands)

    Tummers, Lars; Knies, Eva|info:eu-repo/dai/nl/313875421

    2016-01-01

    This article on public leadership contributes to the literature by (1) focusing on the ‘public’ aspect of leadership and (2) developing quantitative scales for measuring four public leadership roles. These roles all refer to the extent to which public leaders actively support their employees in

  19. Measuring Public Leadership: Developing Scales for Four Key Public Leadership Roles

    NARCIS (Netherlands)

    Tummers, Lars; Knies, Eva

    2016-01-01

    This article on public leadership contributes to the literature by (1) focusing on the ‘public’ aspect of leadership and (2) developing quantitative scales for measuring four public leadership roles. These roles all refer to the extent to which public leaders actively support their employees in deal

  20. Certificate Based Security Services in Adhoc Sensor Network

    Directory of Open Access Journals (Sweden)

    Shahin Fatima

    2014-10-01

    Full Text Available The paper entitled “CERTIFICATE BASED SECURITY SERVICES IN ADHOC SENSOR NETWORK” proposed an approach in which the aim is to find the method for authentication which is more energy efficient and reduces the transmission time of the network. MANETs are of dynamic topology and have no predefined infrastructure. Due to its dynamic topology this network is prone to various kinds of vulnerable attacks. Sensor networks are battery operated and is a major concern. Methods on ID based Authentication consumes more network bandwidth and increases the computation and transmission time of the network. So for better operation, authentication must be the major factor of concern. In this paper a method for authentication in adhoc sensor network is proposed which is based on certificate based security services. Here we will make use of X.509 certificate format. In this some modification is made to the certificate format such that the transmission time and energy consumption of the network is reduced. Our proposed model will provide authentication among nodes and security in MANET. The proposed work is implemented in MATLAB and the result will show the effectiveness of proposed certificate in MANET. The objective of certificate based authentication is to ensure that messages can be read by authorized person only. It also overcomes the non repudiation attacks thereby minimizing the computation and shows how energy varies by making changes in certificate of node.

  1. Data publication and dissemination of interactive keys under the open access model

    Directory of Open Access Journals (Sweden)

    Lyubomir Penev

    2009-09-01

    Full Text Available The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271. The present model is based on previous experience with several existing examples of publishing online keys. However, this model also suggests ways to publish, cite, preserve, disseminate and reuse the original data files to the benefit of the authors, future workers, and society in general. To be regarded as a ''formal scientific publication,'' an online key should satisfy the same criteria of peer review, registration, persistence, bibliographic description, etc., as conventional publications. Keys can be published in a form of either ''static'\\''dynamic'' publications. We define a ''static'' publication as a discrete unit of information preserved in a persistent and unchangeable way on the publisher’s Web site and/or on paper and consequently in conventional/electronic libraries and archives. This contrasts with the nature of the Internet, which allows and tends to encourage updating and improvement on a continuing basis. We call ''dynamic'' a publication of an interactive key on a Web site where its contents can be continuously updated. ''Dynamic'' publications meet some of the criteria of a ''formal scientific publication'' (identification, citation and location, while they lack other important features of it (persistence, archiving, indexing, science metric and citation metric services. Dynamic Web-based interactive keys may benefit from publishing the first version of their underlying datasets in a form of “formal scientific publication”. We define here the minimum set of data files to be published for several different platforms (Intkey, Lucid2, Lucid3, MX to ensure both (1 priority, identification, location and citation of the firstly published work and (2 future use and re-use of the keys.

  2. A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys

    CERN Document Server

    Ioannou, Lawrence M

    2011-01-01

    We give new arguments in support of \\emph{signed quantum key establishment}, where quantum cryptography is used in a public-key infrastructure that provides the required authentication. We also analyze more thoroughly than previous works the benefits that quantum key establishment protocols have over certain classical protocols, motivated in part by the various objections to quantum key establishment that are sometimes raised. Previous knowledge of quantum cryptography on the reader's part is not required for this article, as the definition of "quantum key establishment" that we use is an entirely classical and black-box characterization (one need only trust that protocols satisfying the definition exist).

  3. Security of public key encryption technique based on multiple chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Wang Kai [Department of Radio Engineering, Southeast University, Nanjing 210096 (China)]. E-mail: kaiwang@seu.edu.cn; Pei Wenjiang [Department of Radio Engineering, Southeast University, Nanjing 210096 (China); Zou Liuhua [Department of Radio Engineering, Southeast University, Nanjing 210096 (China); Cheung Yiuming [Department of Computer Science, Hong Kong Baptist University, Hong Kong (China); He Zhenya [Department of Radio Engineering, Southeast University, Nanjing 210096 (China)

    2006-12-25

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP){sup m}, where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications.

  4. Data publication and dissemination of interactive keys under the open access model

    Science.gov (United States)

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  5. Health on Course? Key Messages from the 2002 Dutch Public Health Status and Forecasts Report

    NARCIS (Netherlands)

    Oers JAM van; VTV

    2003-01-01

    The third Dutch Public Health Status and Forecasts (PHSF) report once again contains a large amount of up-todate information about Dutch public health status, prevention and healthcare and includes international and regional comparisons. This brochure contains the Key Messages of the 2002 PHSF summa

  6. Applications of single-qubit rotations in quantum public-key cryptography

    Science.gov (United States)

    Nikolopoulos, Georgios M.

    2008-03-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum states of a qubit and its inversion can be infeasible by virtue of the Holevo’s theorem.

  7. Reducing Communication Overhead For Authentication Using Self Contained Public Key Management Scheme In MANET

    Directory of Open Access Journals (Sweden)

    Gundala Swathi

    2013-06-01

    Full Text Available In the past few years, we have seen a rapid increase in important application fields of Mobile ad-hoc networks (MANET. Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large scale depends on whether we can provide proper dependability. Particularly, security is the most important issue in MANET because of the limitation in resources. Management of keys is the most necessary activity for providing security for the network. MANETs have resource limitations. Thus using public-key based solutions is not feasible. Thus, we use symmetric key establishment. In this paper, a key management scheme which is self contained and public is represented.This scheme achieves near zero communication overhead while providing security services. Cryptographic keys in small numbers are inputted at all nodes prior to the deployment in network. Mathematical Combinations of pairs of keys, both public and private is used for better utilization of storage space. This means a combination of more than one key pair is utilized by nodes for the encryption and the decryption of messages. A secure communication algorithm for forwarding the packets in MANET is also proposed.

  8. Symmetries and security of a quantum-public-key encryption based on single-qubit rotations

    CERN Document Server

    Seyfarth, U; Alber, G

    2012-01-01

    Exploring the symmetries underlying a previously proposed encryption scheme which relies on single-qubit rotations, we derive an improved upper bound on the maximum information that an eavesdropper might extract from all the available copies of the public key. Subsequently, the robustness of the scheme is investigated in the context of attacks that address each public-key qubit independently. The attacks under consideration make use of projective measurements on single qubits and their efficiency is compared to attacks that address many qubits collectively and require complicated quantum operations.

  9. A General Construction of IND-CCA2 Secure Public Key Encryption

    DEFF Research Database (Denmark)

    Kiltz, Eike; Malone-Lee, John

    2003-01-01

    We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction.......We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction....

  10. A General Construction of IND-CCA2 Secure Public Key Encryption

    DEFF Research Database (Denmark)

    Kiltz, Eike; Malone-Lee, John

    2003-01-01

    We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction.......We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction....

  11. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-01

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  12. The Design, Analysis and Optimization of the REESSE1+ Public-key Cryptosystem

    CERN Document Server

    Su, Shenghui

    2007-01-01

    This paper gives the definition of a coprime sequence and the concept of the lever function, describes the five algorithms and six characteristics of the REESSE1+ public-key cryptosystem based on three new hardnesses: the modular subset product problem, the multivariate arrangement problem, and the super logarithm problem in a prime field, shows the correctness of the decryption and verification algorithms, and infers that the probability that a plaintext solution is not unique is nearly zeroth. The authors discuss necessity and sufficiency of the lever function for preventing a continued fraction attack, explain the relation between the lever function and a random oracle, and analyze the security of REESSE1+ against recovering a plaintext from a ciphertext, extracting a private key from a public key or a signature, and faking a digital signature via a public key or known signatures with a public key. On the basis of analysis, believe that the security of REESSE1+ is at least equal to the time complexity of O...

  13. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    KAUST Repository

    Zorgui, Marwen

    2016-04-06

    This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint A on the channel input. The optimal input distribution is proved to be discrete with finite support. To overcome the computationally heavy search for the optimal discrete distribution, several suboptimal schemes are proposed and shown numerically to perform close to the capacity. Moreover, lower and upper bounds for the secret-key capacity are provided and used to prove that the secret-key capacity converges for asymptotic high values of A, to the secret-key capacity with an average power constraint A2. Finally, when the amplitude constraint A is small (A ! 0), the secret-key capacity is proved to be asymptotically equal to the capacity of the legitimate user with an amplitude constraint A and no secrecy constraint.

  14. A generalization of Paillier's public-key system with applications to electronic voting

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jurik, Mads Johan; Nielsen, Jesper Buus

    2010-01-01

    We propose a generalization of Paillier's probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as se......We propose a generalization of Paillier's probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization...... is as secure as Paillier's original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given...... schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can...

  15. A new notion of soundness in bare public-key model

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yunlei; ZHU Hong

    2003-01-01

    A new notion of soundness in bare public-key (BPK) model is presented. This new notion just lies in between one-time soundness and sequential soundness and its reasonableness is justified in the context of resettable zero-knowledge when resettable zero-knowledge prover is implemented by smart card.

  16. Gaussian elimination in split unitary groups with an application to public-key cryptography

    Directory of Open Access Journals (Sweden)

    Ayan Mahalanobis

    2017-07-01

    Full Text Available Gaussian elimination is used in special linear groups to solve the word problem. In this paper, we extend Gaussian elimination to split unitary groups. These algorithms have an application in building a public-key cryptosystem, we demonstrate that.

  17. Practical Cryptanalysis of a Public-key Encryption Scheme Based on New Multivariate Quadratic Assumptions

    DEFF Research Database (Denmark)

    Albrecht, Martin Roland; Faugére, Jean-Charles; Fitzpatrick, Robert

    2014-01-01

    In this paper, we investigate the security of a public-key encryption scheme introduced by Huang, Liu and Yang (HLY) at PKC’12. This new scheme can be provably reduced to the hardness of solving a set of quadratic equations whose coefficients of highest degree are chosen according to a discrete...

  18. Toekomstvaste fysieke toegangsystemen : Public Key Infrastructure als oplossing voor fysiek toegangbeheer

    NARCIS (Netherlands)

    Kleinhuis, G.; Olk, J.G.E.

    2011-01-01

    Voor fysieke toegangssystemen wordt veelal gebruik gemaakt van toegangspassen met een contactlose chip. Soms zijn deze passen ook nog voorzien van een PKI (Public Key Infrastructure) contactchip voor toegang tot ICT en/of het plaatsen van een digitale handtekening. Ook voor fysieke toegang bied PKI

  19. Toekomstvaste fysieke toegangsystemen : Public Key Infrastructure als oplossing voor fysiek toegangbeheer

    NARCIS (Netherlands)

    Kleinhuis, G.; Olk, J.G.E.

    2011-01-01

    Voor fysieke toegangssystemen wordt veelal gebruik gemaakt van toegangspassen met een contactlose chip. Soms zijn deze passen ook nog voorzien van een PKI (Public Key Infrastructure) contactchip voor toegang tot ICT en/of het plaatsen van een digitale handtekening. Ook voor fysieke toegang bied PKI

  20. [Screening on key techniques used for surveillance and disposal of public health emergencies].

    Science.gov (United States)

    Zhu, Q R; Yang, L; Ma, H Y; Xie, W Q; Cong, L M; Xu, L W

    2017-06-10

    Objective: To explore the key techniques used for surveillance and disposal of infectious diseases, food poisoning and hospital infection to improve the ability of surveillance and disposal on public health emergency. Methods: Framework on surveillance and disposal of infectious diseases, food poisoning and hospital infection was set up, based on literature review and expert group discussion. Delphi method and technique for order preference by similarity to ideal solution comprehensive evaluation method were used for ordering preference by similarity, to screen key techniques set for surveillance and disposal of the above said events. Results: Framework to be used for selecting key techniques was designed, based on the classification of emergency events, processing cycle of emergency events and level of techniques. Twenty six public health experts were selected for a 2-round consultation, with their authority as 0.796. Ten key techniques with important significance for surveillance and disposal of infectious diseases, food poisoning and hospital infection were selected from each event. Among these key techniques, the early-warning system was recognized as the key technique, important for the surveillance and disposal of all three emergency events. Items as technology used for unknown pathogenic microorganism detection, personal protection, gene sequencing and tracing technology, microorganism molecular typing technology, nucleic acid detection technology etc. were the key techniques and need to develop for the surveillance and disposal of infectious diseases and iatrogenic infection. Data regarding key technologies on security and privacy, early warning and forecasting, field rapid detection were sorted out that all in need to improve the surveillance programs on disposal of infectious diseases and food poisoning. Data exchange appeared another key technique on infectious diseases, with toxin detection and other 5 techniques the key techniques for food poisoning

  1. BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra

    Directory of Open Access Journals (Sweden)

    Nadia M.G. Alsaidi

    2016-11-01

    Full Text Available New terms such as closest vector problem (CVP and the shortest vector problem (SVP, which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain lattice hardness. A new cryptosystem called NTRU is proven computationally efficient and it can be implemented with low cost. With these characteristics, NTRU possesses advantage over others system that rely on number-theoretical problem in a finite field (e.g. integer factorization problem or discrete logarithm problem. These advantages make NTRU a good choice for many applications. After the adaptation of NTRU, many attempts to generalize its algebraic structure have appeared. In this study, a new variant of the NTRU public key cryptosystem called BITRU is proposed. BITRU is based on a new algebraic structure used as an alternative to NTRU-mathematical structure called binary algebra. This commutative and associative. Establishing two public keys in the proposed system has distinguished it from NTRU and those similar to NTRU cryptosystems. This new structure helps to increase the security and complexity of BITRU. The clauses of BITRU, which include key generation, encryption, decryption, and decryption failure, are explained in details. Its suitability of the proposed system is proven and its security is demonstrated by comparing it with NTRU.

  2. Increasing Ranks of Linear Finite Automata and Complexity of FA Public Key Cryptosystem

    Institute of Scientific and Technical Information of China (English)

    鲍丰

    1994-01-01

    The encryption algorithm of finite automata (FA) public key cryptosystem is implemented by a weakly invertible finite automata (WIFA) which is composed of a nonlinear WIFA with delay 0 and a linear WIFA with delay τ. In this paper, we proved that such an automaton bears the same properties as the linear WIFA and the increasing ranks of the latter are key factors to affecting the former. A probabilistic algorithm is given to realize a ciphertext attack, and its complexity is analysed through the increasing ranks of the linear WIFA. The size of the parameters for safe linear WIFA is estimated.

  3. Cryptanalysis of the public key encryption based on multiple chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Linhua [College of Mathematics and Computer, Chongqing Normal University, Chongqing, 400047 (China)], E-mail: Linzhang@cqu.edu.cn

    2008-08-15

    Recently, Ranjan proposed a novel public key encryption technique based on multiple chaotic systems [Phys Lett 2005;95]. Unfortunately, Wang soon gave a successful attack on its special case based on Parseval's theorem [Wang K, Pei W, Zhou L, et al. Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press]. In this letter, we give an improved example which can avoid the attack and point out that Wang cannot find the essential drawback of the technique. However, further experimental result shows Ruanjan's encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated.

  4. Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and Acquisition of Companies

    Directory of Open Access Journals (Sweden)

    Balachandra Muniyal

    2012-10-01

    Full Text Available The Public Key Infrastructure(PKI provides facilities for data encryption, digital signature and timestamping. It is a system where different authorities verify and authenticate the validity of each participantwith the use of digital certificates. A Certificate Policy (CP is a named set of rules and it indicatesthe applicability of a certificate in a Public Key Infrastructure. Sometimes two companies or organizationswith different PKIs merge. Therefore it would be necessary that their PKIs are also able to merge.Sometimes, the unification of different PKIs is not possible because of the different certificate policies.This paper presents a method to compare and assess certificate policies during merger and acquisitionof companies.

  5. Public key Steganography Using Discrete Cross-Coupled One-Dimensional Chaotic Maps

    Directory of Open Access Journals (Sweden)

    Mahdiyeh Majidpour

    2013-07-01

    Full Text Available By cross-coupling two one-dimensional chaotic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross-coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  6. A Generalisation, a Simplification and some Applications of Paillier's Probabilistic Public-Key System

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jurik, Mads Johan

    2001-01-01

    to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimised such that for a certain range of parameter values, a ballot has size only O(log L) bits.......We propose a generalisation of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without loosing the homomorphic property. We show that the generalisation...... blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up...

  7. [Translational research in geriatrics? A plea based on current biomedical key publications].

    Science.gov (United States)

    Bollheimer, L C; Volkert, D; Bertsch, T; Bauer, J; Klucken, J; Sieber, C C; Büttner, R

    2013-08-01

    Contemporary geriatric research focuses mainly on observational clinical studies and epidemiological surveys and the translation of basic scientific results from biogerontology into a clinical context is often neglected. Following a definition of translational research the article gives an overview of recent key publications in experimental biogerontology with a special emphasis on their relevance for clinical geriatrics. The topics dealt with include age-induced loss of skeletal muscle (sarcopenia), the aging immune system (immunosenescence) and neurodegenerative disorders (Alzheimer's and Parkinson's disease).

  8. Stakeholders' perception of key performance indicators (KPIs) of public-private partnership (PPP) projects

    OpenAIRE

    Olabode Emmanuel Ogunsanmi

    2013-01-01

    The study investigates key performance indicators (KPIs) that could improve performance of public-private partnership (PPP) projects in Nigeria. The study objectives include a comparison of stakeholders’ perception on KPIs and to investigate if significant difference exists between stakeholders’ perceptions on most KPIs. A structured questionnaire was used to collect information from various respondents who were recently involved in PPP projects. Random sampling technique was used to select f...

  9. PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors

    Directory of Open Access Journals (Sweden)

    Changsheng Wan

    2015-01-01

    Full Text Available Due to limited energy of “wireless image sensors (WISs,” existing data integrity protection mechanisms typically employ a hash-function-based signing algorithm to generate “message authentication codes (MACs” for long image frames. However, hash-function-based signing algorithm requires the WIS and the “end user (EU” sharing a secret, which leads to a new security issue: Once the EU becomes malicious due to some reasons, it will be able to forge the WIS’s data since it holds the shared secret. Therefore, public-key cryptography is desirable. Unfortunately, public-key cryptographic operations are quite time-consuming for energy-restrained WISs. Facing this dilemma, we present a novel data integrity protection protocol named PKDIP in this paper. Similar to the mechanisms of this field, PKDIP generates MACs for data integrity protection. However, different from other well-known approaches, PKDIP introduces the “Montgomery Modular Multiplication (MontMM” technique to current public-key-based signing algorithms. Since MontMM is much more efficient than hash functions, PKDIP can reduce the signing cost significantly. Experimental results show PKDIP can even be more efficient than hash-function-based schemes.

  10. Securing U-Healthcare Sensor Networks using Public Key Based Scheme

    CERN Document Server

    Haque, Md Mokammel; Hong, Choong Seon

    2008-01-01

    Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data, austere privacy and security are inevitable for all parts of healthcare systems. However, the constantly evolving nature and constrained resources of sensors in WSN inflict unavailability of a lucid line of defense to ensure perfect security. In order to provide holistic security, protections must be incorporated in every component of healthcare sensor networks. This paper proposes an efficient security scheme for healthcare applications of WSN which uses the notion of public key cryptosystem. Our entire security scheme comprises basically of two parts; a key handshaking scheme based on simple linear operations and the derivation of decryption key by a receiver node for a particular sender in the network. Our architecture allows both base station to node or node to base station secure communications, and node-to-node secure commun...

  11. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-06-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  12. Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC

    Directory of Open Access Journals (Sweden)

    Arindam Sarkar

    2012-10-01

    Full Text Available In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography (FLHSPKC has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN has several major constraints likes’ inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC which is a sort of public-key cryptography used in wireless communication provides equivalent level of security like other existing public–key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.

  13. Key Data Gaps Regarding the Public Health Issues Associated with Opioid Analgesics.

    Science.gov (United States)

    Schmidt, Teresa D; Haddox, J David; Nielsen, Alexandra E; Wakeland, Wayne; Fitzgerald, John

    2015-10-01

    Most pharmaceutical opioids are used to treat pain, and they have been demonstrated to be effective medications for many. Their abuse and misuse pose significant public health concerns in the USA. Research has provided much insight into the prevalence, scope, and drivers of opioid abuse, but a holistic understanding is limited by a lack of available data regarding key aspects of this public health problem. Twelve data gaps were revealed during the creation of a systems-level computer model of medical use, diversion, nonmedical use, and the adverse outcomes associated with opioid analgesics in the USA. Data specific to these gaps would enhance the validity and real-world applications of systems-level models of this public health problem and would increase understanding of the complex system in which use and abuse occur. This paper provides an overview of these gaps, argues for the importance of closing them, and provides specific recommendations for future data collection efforts.

  14. Automated information extraction of key trial design elements from clinical trial publications.

    Science.gov (United States)

    de Bruijn, Berry; Carini, Simona; Kiritchenko, Svetlana; Martin, Joel; Sim, Ida

    2008-11-06

    Clinical trials are one of the most valuable sources of scientific evidence for improving the practice of medicine. The Trial Bank project aims to improve structured access to trial findings by including formalized trial information into a knowledge base. Manually extracting trial information from published articles is costly, but automated information extraction techniques can assist. The current study highlights a single architecture to extract a wide array of information elements from full-text publications of randomized clinical trials (RCTs). This architecture combines a text classifier with a weak regular expression matcher. We tested this two-stage architecture on 88 RCT reports from 5 leading medical journals, extracting 23 elements of key trial information such as eligibility rules, sample size, intervention, and outcome names. Results prove this to be a promising avenue to help critical appraisers, systematic reviewers, and curators quickly identify key information elements in published RCT articles.

  15. An efficient and provably-secure certificateless public key encryption scheme for telecare medicine information systems.

    Science.gov (United States)

    Guo, Rui; Wen, Qiaoyan; Shi, Huixian; Jin, Zhengping; Zhang, Hua

    2013-10-01

    Telecare Medicine Information Systems (TMIS) promote the traditional medical and healthcare services by information and communication technology. Since the physician and caregiver can monitor the patient's physiological condition remotely in TMIS, the confidentiality of this sensitive data should be protected, which is the key issue in the Health Insurance Portability and Accountability Act. In this paper, we propose an efficient certificateless public key encryption scheme without bilinear pairing for TMIS. Our proposal is proved to be secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. Moreover, after modifying the original model of the certificateless encryption, this scheme achieves Girault's trust level 3. Compared with the related protocols, the perform evaluations show that our scheme is more efficient and appropriate to collocate with low power mobile devices for TMIS.

  16. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  17. Enhanced Montgomery Multiplication on DSP Architectures for Embedded Public-Key Cryptosystems

    Directory of Open Access Journals (Sweden)

    Gastaldo P

    2008-01-01

    Full Text Available Abstract Montgomery's algorithm is a popular technique to speed up modular multiplications in public-key cryptosystems. This paper tackles the efficient support of modular exponentiation on inexpensive circuitry for embedded security services and proposes a variant of the finely integrated product scanning (FIPS algorithm that is targeted to digital signal processors. The general approach improves on the basic FIPS formulation by removing potential inefficiencies and boosts the exploitation of computing resources. The reformulation of the basic FIPS structure results in a general approach that balances computational efficiency and flexibility. Experimental results on commercial DSP platforms confirm both the method's validity and its effectiveness.

  18. In science communication, why does the idea of the public deficit always return? Exploring key influences.

    Science.gov (United States)

    Suldovsky, Brianne

    2016-05-01

    Despite mounting criticism, the deficit model remains an integral part of science communication research and practice. In this article, I advance three key factors that contribute to the idea of the public deficit in science communication, including the purpose of science communication, how communication processes and outcomes are conceptualized, and how science and scientific knowledge are defined. Affording science absolute epistemic privilege, I argue, is the most compelling factor contributing to the continued use of the deficit model. In addition, I contend that the deficit model plays a necessary, though not sufficient, role in science communication research and practice. Areas for future research are discussed.

  19. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    Energy Technology Data Exchange (ETDEWEB)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  20. The EU Clinical Trials Regulation: key priorities, purposes and aims and the implications for public health.

    Science.gov (United States)

    Flear, Mark L

    2016-03-01

    The replacement of the European Union (EU) Clinical Trials Directive by the new Clinical Trials Regulation (CTR), which entered into force on 16 June 2014 but will not apply before 28 May 2016, provides an opportunity to review the legal and political context within which this important aspect of research law and policy sits and to reflect on the implications for public health. My aim in this article is to relate the context to the key purposes and aims of EU law and policy on clinical trials in order to explain and clarify its orientation. On that basis, I argue that the CTR and the changes it introduces to the law on clinical trials are part of the EU's continued focus on market optimisation. It is this focus that orients and directs the wider pharmaceutical development pipeline, but that undermines the achievement of key public health objectives. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  1. Breaking Classical Public Key Cryptosystems by Using a Novel Ensemble Search Algorithm

    CERN Document Server

    Chen, C Y

    2004-01-01

    In this paper, we improve Bruschweiler's algorithm such that only one query is needed for searching the single object z from N=2^n unsorted elements. Our algorithm construct the new oracle query function g(.) satisfying g(x)=0 for all input x, except for one, say x=z, where g(z)=z. To store z, our algorithm extends from one ancillary qubit to n ancillary qubits. We then measure these ancillary qubits to discover z. We further use our ensemble search algorithm to attack classical public key cryptosystems. Given the ciphertext C=Ek(m, r) which is generated by the encryption function Ek(), a public key k, a message m, and a random number r, we can construct an oracle query function h(.) satisfying h(m', r')=0 if Ek(m', r')!=C and h(m', r')= (m', r') if Ek(m', r')=C. There is only one object, say (m, r), can be discovered in decryption of C. By preparing the input with all possible states of (m', r'), we can thus use our ensemble search algorithm to find the wanted object (m, r). Obviously, we break the classical...

  2. Key Performance Indicators for Maintenance Management Effectiveness of Public Hospital Building

    Directory of Open Access Journals (Sweden)

    Farhana Omar Mardhiah

    2017-01-01

    Full Text Available Effectiveness of management in maintenance aspect holds the key element in influencing the performance of overall maintenance management. Similarly, public hospital building needs an effective maintenance management as this type of building in nature is one of the most complex issues in the field of maintenance. Improper building maintenance management adopted by the organization significantly will interrupt the overall operation of the building. Therefore, this paper is aim to identifying the key performance indicator (KPI of effectiveness of maintenance management for the public hospital building. A total of 32 set of questionnaires were distributed to the maintenance manager for each hospital in the northern region of peninsular Malaysia by using self-administration strategy. The survey answer was analyzed by performing descriptive analysis in SPSS. Overall, the result of descriptive analysis shows that all the ten factors of effectiveness of maintenance management are accepted as KPI since the mean value is at least 3.93 which classified as important and significant. The most significant factor of effectiveness of maintenance management is task planning and scheduling with the mean score of 4.35. While less significant factor is identify as maintenance approach with the value of mean score is 3.93. The both results indicates that the management need to have well-structured planning for the maintenance works and also need to embrace the exact strategy of maintenance approach in order to achieved better overall performance of maintenance management. This study may draw a standard practice for the government in assessing the performance of public facilities in terms of maintenance management.

  3. Understanding key influencers' attitudes and beliefs about healthy public policy change for obesity prevention.

    Science.gov (United States)

    Raine, Kim D; Nykiforuk, Candace I J; Vu-Nguyen, Karen; Nieuwendyk, Laura M; VanSpronsen, Eric; Reed, Shandy; Wild, T Cameron

    2014-11-01

    As overweight and obesity is a risk factor for chronic diseases, the development of environmental and healthy public policy interventions across multiple sectors has been identified as a key strategy to address this issue. In 2009, a survey was developed to assess the attitudes and beliefs regarding health promotion principles, and the priority and acceptability of policy actions to prevent obesity and chronic diseases, among key policy influencers in Alberta and Manitoba, Canada. Surveys were mailed to 1,765 key influencers from five settings: provincial government, municipal government, school boards, print media companies, and workplaces with greater than 500 employees. A total of 236 surveys were completed with a response rate of 15.0%. Findings indicate nearly unanimous influencer support for individual-focused policy approaches and high support for some environmental policies. Restrictive environmental and economic policies received weakest support. Obesity was comparable to smoking with respect to perceptions as a societal responsibility versus a personal responsibility, boding well for the potential of environmental policy interventions for obesity prevention. This level of influencer support provides a platform for more evidence to be brokered to policy influencers about the effectiveness of environmental policy approaches to obesity prevention. © 2014 The Obesity Society.

  4. A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

    Directory of Open Access Journals (Sweden)

    Chin-Chen Chang

    2009-03-01

    Full Text Available In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt another approach to retain its blockwise independent property. Our scheme can avoid the conditions necessary for such attacks to befeasible. Furthermore, our scheme extracts the inherent image features and embeds them into this image as the watermark. This relieves users from having to maintain a database of watermarks from various sources. Experimental results show that the watermark insertion procedure has little effect on the visual quality of the watermarked image. They also show our scheme can locate the modifications made to the watermarked image, including imagescaling, cropping, geometric distortion, pixel value changes, etc.

  5. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  6. Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem

    CERN Document Server

    Kabetta, Herman; Suyoto,

    2012-01-01

    In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS is visible by all users as the original script, but it can not be granted changed. Website is a tool of information disseminator throughout the world, this is certainly can be used to a secret communication by using CSS as a message hider. This paper proposed a new scheme using web tools like CSS for hiding informations. This is a secret communication mechanism using text steganography techniques that is embedded messages on CSS files and is further encrypted using RSA as a public key cryptographic algorithm.

  7. Funding ATLAS 2012 key indicators for publicly funded research in Germany

    CERN Document Server

    Deutsche Forschungsgemeinschaft (DFG)

    2013-01-01

    The Funding ATLAS is a reporting system (previously referred to as the Funding Ranking) employed by the German Research Foundation (DFG) to provide information in the form of indicators of key developments in publicly funded research in Germany every three years. This English version of the Funding ATLAS 2012 presents selected findings from the more comprehensive German edition. At the core of the report are indicators that provide information on which subject areas have received funding at higher education and other research institutions in the period 2008-2010. This report also includes, as a supplement not found in the German edition, the decisions on the Excellence Initiative, which were taken shortly after the German edition of the Funding ATLAS 2012 was published. The report also addresses the subject of internationality by presenting selected indicators that show how attractive Germany's research institutions are for visiting scientists. In summary, the DFG Funding ATLAS furnishes reliable indicators o...

  8. Health and safety's stewardship of key business values: employees, public trust, and responsibility to shareholders.

    Science.gov (United States)

    Fulwiler, R D

    1993-11-01

    This paper reviews how one company has been able to develop and implement a highly effective job safety and health system and to sustain it at a high level of performance. This process begins with a simple but clear corporate safety and health policy statement: "Procter & Gamble insists on safe operation." It is driven by three critical values, namely: 1) its employees, 2) its public trust, and 3) its profits. The impact of workers' compensation costs on company profits is examined, along with the enormous savings in these costs that have been achieved by the company's commitment to total quality. This is followed by brief descriptions of the company's "Total Incident Rate" and it's "Key Elements" systems, and the relationships between them. The paper concludes with a description of the company's model for enabling all employees to make recommendations for continuous improvement of health and safety systems throughout all of the company's operations.

  9. Healthcare public key infrastructure (HPKI) and non-profit organization (NPO): essentials for healthcare data exchange.

    Science.gov (United States)

    Takeda, Hiroshi; Matsumura, Yasushi; Nakagawa, Katsuhiko; Teratani, Tadamasa; Qiyan, Zhang; Kusuoka, Hideo; Matsuoka, Masami

    2004-01-01

    To share healthcare information and to promote cooperation among healthcare providers and customers (patients) under computerized network environment, a non-profit organization (NPO), named as OCHIS, was established at Osaka, Japan in 2003. Since security and confidentiality issues on the Internet have been major concerns in the OCHIS, the system has been based on healthcare public key infrastructure (HPKI), and found that there remained problems to be solved technically and operationally. An experimental study was conducted to elucidate the central and the local function in terms of a registration authority and a time stamp authority by contracting with the Ministry of Economics and Trading Industries in 2003. This paper describes the experimental design with NPO and the results of the study concerning message security and HPKI. The developed system has been operated practically in Osaka urban area.

  10. [Reversal of aging and lifespan elongation. Current biomedical key publications and the implications for geriatrics].

    Science.gov (United States)

    Bollheimer, L C; Volkert, D; Bertsch, T; Sieber, C C; Büttner, R

    2013-08-01

    Biological aging means a time-dependent accumulation of changes to which a living organism is being exposed during its lifetime. Biological aging normally concurs with chronological aging the time frame of which is set by an upper limit, the lifespan (in humans approximately 120 years). New findings in experimental biogerontology are challenging both the dogma of irreversibility of biological aging and the preset species-specific limitations of life. The present overview first explains the general principle of rejuvenation and reversal of biological aging with paradigms from stem cell research. Secondly, recent key publications on artificial telomerase elongation and (alleged) lifespan enhancement by sirtuins and resveratrol will be discussed with an emphasis on the implications for (future) geriatric medicine.

  11. 一种新的公钥基础设施——SPKI%A New Public Key Infrastructure - SPKI

    Institute of Scientific and Technical Information of China (English)

    张鹏程; 陈克非

    2003-01-01

    Information security is a part of the core of computer field. This existing PKI system can not satisfy themore and more demand from people. Simple Public Key Infrastructure, SPKI, is new standard of public key certifi-cate, which can bring a simple but precise naming and authorization system for distributed computing environment.The base theory of SPKI is presented, and the brief analysis about its study hotspots and shortcomings are also shownin the paper.

  12. A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie–Hellman with privacy preserving public key infrastructure

    Indian Academy of Sciences (India)

    Vankamamidi S Naresh; Nistala V E S Murthy

    2015-10-01

    In this paper a new two-round authenticated contributory group key agreement based on Elliptic Curve Diffie–Hellman protocol with Privacy Preserving Public Key Infrastructure (PP-PKI) is introduced and is extended to a dynamic authenticated contributory group key agreement with join and leave protocols for dynamic groups. The proposed protocol provides such security attributes as forward secrecy, backward secrecy, and defense against man in the middle (MITM) and Unknown keyshare security attacks and also authentication along with privacy preserving attributes like anonymity, traceability and unlinkability. In the end, they are compared with other popular Diffie–Hellman and Elliptic Curve Diffie–Hellman based group key agreement protocols and the results are found to be satisfactory.

  13. Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Kambourakis Georgios

    2004-01-01

    Full Text Available While mobile hosts are evolving into full-IP enabled devices, there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism in mobile communication systems beyond 3G (B3G. Work has already begun on such an “all-IP” end-to-end solution, commonly referred to as 4G systems. Fully fledged integration between heterogeneous networks, such as 2.5G, UMTS, WLAN, Bluetooth, and the Internet, demands fully compatible, time-tested, and reliable mechanisms to depend on. SSL protocol has proved its effectiveness in the wired Internet and it will probably be the most promising candidate for future wireless environments. In this paper, we discuss existing problems related to authentication and key agreement (AKA procedures, such as compromised authentication vectors attacks, as they appear in current 2/2.5G/3G mobile communication systems, and propose how SSL, combined with public key infrastructure (PKI elements, can be used to overcome these vulnerabilities. In this B3G environment, we perceive authentication as a service, which has to be performed at the higher protocol layers irrespective of the underlying network technology. Furthermore, we analyze the effectiveness of such a solution, based on measurements of a “prototype” implementation. Performance measurements indicate that SSL-based authentication can be possible in terms of service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.

  14. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...... recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation...... review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed...

  15. Coordination between veterinary services and other relevant authorities: a key component of good public governance.

    Science.gov (United States)

    Bellemain, V

    2012-08-01

    Coordination between Veterinary Services and other relevant authorities is a key component of good public governance, especially for effective action and optimal management of available resources. The importance of good coordination is reflected in the World Organisation for Animal Health'Tool forthe Evaluation of Performance of Veterinary Services', which includes a critical competency on coordination. Many partners from technical, administrative and legal fields are involved. The degree of formalisation of coordination tends to depend on a country's level of organisation and development. Contingency plans against avian influenza led to breakthroughs in many countries in the mid-2000s. While interpersonal relationships remain vital, not everything should hinge on them. Organisation and management are critical to operational efficiency. The distribution of responsibilities needs to be defined clearly, avoiding duplication and areas of conflict. Lead authorities should be designated according to subject (Veterinary Services in animal health areas) and endowed with the necessary legitimacy. Lead authorities will be responsible for coordinating the drafting and updating of the relevant documents: agreements between authorities, contingency plans, standard operating procedures, etc.

  16. E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

    Directory of Open Access Journals (Sweden)

    Najlaa A. Abuadhmah

    2010-01-01

    Full Text Available Problem statement: Visa is a very important travelling document, which is an essential need at the point of entry of any country we are visiting. However an important document such as visa is still handled manually which affects the accuracy and efficiency of processing the visa. Work on e-visa is almost unexplored. Approach: This study provided a detailed description of a newly proposed e-visa verification system prototyped based on RFID technology. The core technology of the proposed e-visa verification system is based on Identity Based Encryption (IBE and Public Key Infrastructure (PKI. This research provided comparison between both methods in terms of processing time and application usability. Results: The result showed the e-visa verification system is highly flexible when implemented with IBE and on the other hand produces better processing speed when implemented with PKI. Conclusion: Therefore, it is believed that the proposed e-visa verification schemes are valuable security protocol for future study on e-visa.

  17. Optimal-Rate Coding Theorem For Adversarial Networks in the Public-Key Setting

    CERN Document Server

    Amir, Yair; Ostrovksy, Rafail

    2008-01-01

    In this paper, we establish an optimal-rate (interactive) coding theorem in the public-key setting for synchronous networks in the presence of a malicious poly-time adversary for dynamically changing networks. Namely, even if the majority of the nodes are controlled by a malicious adversary and the topology of the network is changing at each round, then as long as there is some path of non-corrupted nodes connecting the sender and receiver at each round (though this path may change at every round) we construct a protocol with bounded memory per processor that achieves optimal transfer rate and negligible decoding error. This protocol will transmit polynomially many messages of polynomial size with constant overhead per bit. We stress that our protocol assumes no knowledge of which nodes are corrupted nor which path is reliable at any round. Our interactive coding theorem states that our protocol cannot be affected in a meaningful way by any polynomial-time malicious adversary whose goal is to disrupt and dest...

  18. Stakeholders' perception of key performance indicators (KPIs of public-private partnership (PPP projects

    Directory of Open Access Journals (Sweden)

    Olabode Emmanuel Ogunsanmi

    2013-12-01

    Full Text Available The study investigates key performance indicators (KPIs that could improve performance of public-private partnership (PPP projects in Nigeria. The study objectives include a comparison of stakeholders’ perception on KPIs and to investigate if significant difference exists between stakeholders’ perceptions on most KPIs. A structured questionnaire was used to collect information from various respondents who were recently involved in PPP projects. Random sampling technique was used to select forty-five (45 respondents out of which thirty-one (31 responses were used for the data analysis. The results indicate that top KPIs for performance improvement are levels of design complexity and technological advancement, and return on investment. Stakeholders agree on most of the rankings of the KPIs. The general perception of stakeholders was similar on most KPIs except for a few divergent opinions. The study findings have an implication for policy and decision making such that stakeholders could pay special attention to the KPIs identified, that could improve construction project performance. Finally the study recommends further research to explore KPIs for other procurement options.

  19. Applications of Public Key Watermarking for Authentication of Job-Card in MGNREGA

    Directory of Open Access Journals (Sweden)

    Sunil Karforma

    2012-01-01

    Full Text Available Nowadays different state governments and central governments have taken initiative to successfully implement E-Governance in various areas of services applying Information and Communication Technology (ICT to provide better transparency, accuracy & security of its services to the citizens. In September, 2005, Parliament of India has passed the Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA, to enhance livelihood security by giving at least 100 days of guaranteed wage employment in a financial year to every house-hold in rural India. E-Governance solutions helps to simplify complex manual activities and supports transparent wage payment through agencies like Bank and Post-Offices. In e-governance, information’s are exchanged between communicating parties via Internet and message may be changed, modified or destroyed by hackers during its transmission through Internet. So, information hiding is needed at the time of exchanging information via Internet. In this paper, we propose a tool, called Public-Key Watermarking algorithm, for integrity verification of Job-Card (JC issued to individual house-hold by state governments, so that the watermark is capable enough to detect any changes made to the Job-Card by malicious users and can also identify fraudulent wage payment.

  20. Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In traditional networks ,the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this paper, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short,the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust requirement of hosts better.

  1. A Market Analysis of Publications, Trade Conferences, and Key Events for Fleet Readiness Center Southwest

    Science.gov (United States)

    2007-12-01

    Win and Keep Big Customers. Austin: Bard Press, 2005. Kotler , Philip and Kevin Lane Keller. Marketing Management. Upper Saddle River, NJ...stimulate awareness and demand with little or no cost. Kotler and Keller describe public relations and publicity as “a variety of programs designed to...broadcast media to promote something.”13 Kotler and Keller also argue that there is an appeal to the use of public relations and publicity that is based

  2. Key challenges of offshore wind power: Three essays addressing public acceptance, stakeholder conflict, and wildlife impacts

    Science.gov (United States)

    Bates, Alison Waterbury

    been proposed. The essay examines how the public considers the societal tradeoffs that are made to develop small-scale, in-view demonstration wind projects instead of larger facilities farther offshore. Results indicate that a strong majority of the public supports near-shore demonstration wind projects in both states. Primary reasons for support include benefits to wildlife, cost of electricity, and job creation, while the primary reasons for opposition include wildlife impacts, aesthetics, tourism, and user conflicts. These factors differ between coastal Delaware and greater Atlantic City and highlight the importance of local, community engagement in the early stages of development. The second essay examines the interaction of a new proposed use of the ocean---offshore wind---and a key existing ocean user group---commercial fishers. A key component of offshore wind planning includes consideration of existing uses of the marine environment in order to optimally site wind projects while minimizing conflicts. Commercial fisheries comprise an important stakeholder group, and may be one of the most impacted stakeholders from offshore renewable energy development. Concern of the fishing industry stems from possible interference with productive fishing grounds and access within wind developments resulting in costs from increased effort or reduction in catch. Success of offshore wind development may in part depend on the acceptance of commercial fishers, who are concerned about loss of access to fishing grounds. Using a quantitative, marine spatial planning approach in the siting of offshore wind projects with respect to commercial fishing in the mid-Atlantic, U.S., this essay develops a spatially explicit representation of potential conflicts and compatibilities between these two industries in the mid-Atlantic region of the United States. Areas that are highly valuable to the wind industry are determined through a spatial suitability model using variable cost per unit

  3. An Investigation of the National School Board Association Key Work Standards for Public Policy Leadership and School Board Chair Performance

    Science.gov (United States)

    Quarles, Roger C.

    2011-01-01

    This multiple case qualitative study addressed the National School Board Association's (NSBA) Key Work standards for public policy leadership by local school boards, and how three elite school board chairs understood and implemented those standards. Elite board chair status was defined by experience, training, and peer recognition. The study…

  4. An Investigation of the National School Board Association Key Work Standards for Public Policy Leadership and School Board Chair Performance

    Science.gov (United States)

    Quarles, Roger C.

    2011-01-01

    This multiple case qualitative study addressed the National School Board Association's (NSBA) Key Work standards for public policy leadership by local school boards, and how three elite school board chairs understood and implemented those standards. Elite board chair status was defined by experience, training, and peer recognition. The study…

  5. Public health ethics: key concepts and issues in policy and practice

    National Research Council Canada - National Science Library

    Dawson, Angus

    2011-01-01

    .... Topics covered include the nature of public health ethics, the concepts of disease and prevention, risk and precaution, health inequalities and justice, screening, vaccination and disease control...

  6. Best practices for interacting with the public about wildland fire: Key findings from interviews

    Science.gov (United States)

    Daniel Berkman

    2012-01-01

    Interviews were conducted with public information and line officers about wildland fire communications with the public. The goal of these interviews was to determine the best practices and most useful content and format for an annotated bibliography about external wildland fire communications, i.e., does the current literature reviewed address the issues of greatest...

  7. Key issues of public relations of Europe: Findings from the European Communication Monitor 2007-2014

    Directory of Open Access Journals (Sweden)

    Dejan Vercic

    2014-10-01

    Full Text Available European Communication Monitor is the largest longitudinal research project in public relations practice in the world. Data collected annually from 2007 to 2014 show that practitioners perceive five issues as the most important for their work: linking business strategy and communication, coping with the digital evolution and social web, building and maintaining trust, dealing with the demand for more transparency and active audiences, and dealing with the speed and volume of information flow. Perception of the importance of various issues for the practice of public relations is largely dependent on the gender, geography (division between Northern and Western vs. Southern and Eastern Europe, and sector in which a practitioner works (corporate, government, NGO or agency. While gender and sectorial differences studied in academic public relations literature, divisions in public relations practice between North-Western and South-Eastern Europe are largely ignored.

  8. Building Interdisciplinary Research Capacity: a Key Challenge for Ecological Approaches in Public Health

    Directory of Open Access Journals (Sweden)

    Lindsay P. Galway

    2016-06-01

    Full Text Available The shortcomings of public health research informed by reductionist and fragmented biomedical approaches and the emergence of wicked problems are fueling a renewed interest in ecological approaches in public health. Despite the central role of interdisciplinarity in the context of ecological approaches in public health research, inadequate attention has been given to the specific challenge of doing interdisciplinary research in practice. As a result, important knowledge gaps exist with regards to the practice of interdisciplinary research. We argue that explicit attention towards the challenge of doing interdisciplinary research is critical in order to effectively apply ecological approaches to public health issues. This paper draws on our experiences developing and conducting an interdisciplinary research project exploring the links among climate change, water, and health to highlight five specific insights which we see as relevant to building capacity for interdisciplinary research specifically, and which have particular relevance to addressing the integrative challenges demanded by ecological approaches to address public health issues. These lessons include: (i the need for frameworks that facilitate integration; (ii emphasize learning-by-doing; (iii the benefits of examining issues at multiple scales; (iv make the implicit, explicit; and (v the need for reflective practice. By synthesizing and sharing experiences gained by engaging in interdisciplinary inquiries using an ecological approach, this paper responds to a growing need to build interdisciplinary research capacity as a means for advancing the ecological public health agenda more broadly.

  9. Civic participation and public spaces: a key factor for sustainable tourism in historic cities

    Directory of Open Access Journals (Sweden)

    Martin van der Zwan

    2016-06-01

    Full Text Available Attractive public spaces are crucial for tourism. After all, most tourists that visit a city, experience it by foot and increasingly by bicycle. Public spaces have to meet a few minimum requirements. If not, tourists will feel uncomfortable. For instance; a lot of rubbish and graffiti, worn out and damaged street furniture can cause a feeling of unsafety. Attractive public spaces are the ones that invite tourists to stay a bit longer than strictly necessary and sit down and relax. Some of these spaces are quit and green, others more vibrant, well dimensioned and furbished. In this paper I describe a method for defining and measuring the quality of public space and also for predicting the conclusion tourists may draw based on this; “will I revisit this place or not ?” In some cities inhabitants, local shop owners and local institutions voluntarily take the initiative to upgrade the quality of public spaces or even act as ‘city hosts’ to welcome visitors. These kinds of civic participation help to provide the unique experience many tourists are looking for.

  10. Finding your voice: key elements to consider when writing for publication.

    Science.gov (United States)

    Wollin, Judy Ann; Fairweather, Carrie Therese

    The dissemination of nursing knowledge rests on optimizing the accessibility of such knowledge among nurses and all other healthcare professionals. Nursing publications of all types, including research, case studies, reports, literature reviews, clinical audits, reflections on practice and letters to the editor, are important mechanisms for sharing knowledge and experience. Nurses need to publish their knowledge and experiences to inform and reflect on nursing practice. Barriers to writing for publication include inexperience and lack of know how. This article provides guidance for the novice writer.

  11. Public Key Infrastructure (PKI) And Virtual Private Network (VPN) Compared Using An Utility Function And The Analytic Hierarchy Process (AHP)

    OpenAIRE

    Wagner, Edward Dishman

    2002-01-01

    This paper compares two technologies, Public Key Infrastructure (PKI) and Virtual Private Network (VPN). PKI and VPN are two approaches currently in use to resolve the problem of securing data in computer networks. Making this comparison difficult is the lack of available data. Additionally, an organization will make their decision based on circumstances unique to their information security needs. Therefore, this paper will illustrate a method using a utility function and the Analytic Hie...

  12. 基于共享密钥的RFID认证协议%RFID Authentication Protocol Based on Public Crypto Key

    Institute of Scientific and Technical Information of China (English)

    冯军; 潘郁

    2012-01-01

    Aiming at the problems presently existing in security of the radio frequency identification (RFID) technology, the RFID security protocol is designed by adopting Hash function and public crypto key. The security and privacy issues existing in practical applications of RFID are analyzed, and the RFID authentication protocol based on NTRU public key crypto graphy system and Hash function is proposed. By adopting NTRU public key crypto system, the shared key is generated, and the shared key is conducted with Hash operation by using Hash function, and the information security of RFID is guaranteed. The theoretical analysis shows that this protocol can effectively protect the information from the secure attacks, e.g. , divulging, disguising and position tracking, etc.%针对目前无线射频识别(RHD)技术在安全性方面存在的问题,采用散列函数和共享密钥设计了RFID安全协议.分析了RFID在实际应用中存在的安全和隐私问题,提出了一种基于数论研究单元(NTRU)公钥密码系统和Hashh函数的RFID认证协议.该协议利用NTRU公钥密码系统产生系统的共享公钥,并运用Hash函数对共享公钥进行Hash运算,保证了RFID系统信息安全性.理论分析表明,该协议能有效地防止消息泄漏、伪装、定位跟踪等安全攻击.

  13. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    Science.gov (United States)

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  14. Key issues of public relations of Europe: findings from the European Communication Monitor 2007-2014

    NARCIS (Netherlands)

    Verčič, D.; Verhoeven, P.; Zerfass, A.

    2014-01-01

    European Communication Monitor is the largest longitudinal research project in public relations practice in the world. Data collected annually from 2007 to 2014 show that practitioners perceive five issues as the most important for their work: linking business strategy and communication, coping with

  15. Key issues of public relations of Europe: findings from the European Communication Monitor 2007-2014

    NARCIS (Netherlands)

    Verčič, D.; Verhoeven, P.; Zerfass, A.

    2014-01-01

    European Communication Monitor is the largest longitudinal research project in public relations practice in the world. Data collected annually from 2007 to 2014 show that practitioners perceive five issues as the most important for their work: linking business strategy and communication, coping with

  16. The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation

    CERN Document Server

    Su, Shenghui; Hu, Jun

    2008-01-01

    This paper gives the definitions of a nonnormal super-increasing sequence and a nonnormal subset sum separately, proves the two properties of a nonnormal super-increasing sequence, and proposes the REESSE2+ public-key encryption scheme which includes the three algorithms for key generation, encryption and decryption. The paper discusses the necessity and sufficiency of the lever function for preventing the Shamir extremum attack, analyzes the security of REESSE2+ against extracting a private key from a public key through the exhaustive search, recovering a plaintext from a ciphertext plus a knapsack of high density through the LLL lattice basis reduction method, and heuristically obtaining a plaintext through the meet-in-the-middle attack or the adaptive-chosen-ciphertext attack. The authors evaluate the time complexity of the REESSE2+ algorithms, compare REESSE2+ with ECC and NTRU, and find that the encryption speed of REESSE2+ is ten thousand times faster than ECC and NTRU bearing the matchable security, an...

  17. Public-private relationships in biobanking: a still underestimated key component of open innovation.

    Science.gov (United States)

    Hofman, Paul; Bréchot, Christian; Zatloukal, Kurt; Dagher, Georges; Clément, Bruno

    2014-01-01

    Access to human bioresources is essential to the understanding of human diseases and to the discovery of new biomarkers aimed at improving the diagnosis, prognosis, and the predictive response of patients to treatments. The use of biospecimens is strictly controlled by ethical assessment, which complies with the laws of the country. These laws regulate the partnerships between the biobanks and industrial actors. However, private-public partnerships (PPP) can be limiting for several reasons, which can hamper the discovery of new biological tests and new active molecules targeted to human diseases. The bottlenecks and roadblocks in establishing these partnerships include: poor organization of the biobank in setting up PPP, evaluation of the cost of human samples, the absence of experience on the public side in setting up contracts with industry, and the fact that public and private partners may not share the same objectives. However, it is critical, in particular for academic biobanks, to establish strong PPP to accelerate translational research for the benefits of patients, and to allow the sustainability of the biobank. The purpose of this review is to discuss the main bottlenecks and roadblocks that can hamper the establishment of PPP based on solid and trusting relationships.

  18. Why sustainable population growth is a key to climate change and public health equity.

    Science.gov (United States)

    Howat, Peter; Stoneham, Melissa

    2011-12-01

    Australia's population could reach 42 million by 2050. This rapid population growth, if unabated, will have significant social, public health and environmental implications. On the one hand, it is a major driver of climate change and environmental degradation; on the other it is likely to be a major contributor to growing social and health issues including a decline in quality of life for many residents. Disadvantaged and vulnerable groups will be most affected. The environmental, social and health-related issues include: pressure on the limited arable land in Australia; increased volumes of industrial and domestic waste; inadequate essential services; traffic congestion; lack of affordable housing; declining mental health; increased obesity problems; and inadequate aged care services. Many of these factors are related to the aggravation of climate change and health inequities. It is critical that the Australian Government develops a sustainable population plan with stabilisation of population growth as an option. The plan needs to ensure adequate hospitals and healthcare services, education facilities, road infrastructure, sustainable transport options, water quality and quantity, utilities and other amenities that are already severely overburdened in Australian cities. There is a need for a guarantee that affordable housing will be available and priority be given to training young people and Indigenous people for employment. This paper presents evidence to support the need for the stabilisation of population growth as one of the most significant measures to control climate change as well as to improve public health equity.

  19. [Key measures for developing palliative care from a public health perspective. Initial results from a three-round Delphi study].

    Science.gov (United States)

    Behmann, M; Jünger, S; Radbruch, L; Schneider, N

    2011-05-01

    Recently, six key targets for public health initiatives to improve palliative care in Germany were defined. This article reports the initial results of a follow-up study aiming at developing concrete measures to achieve these targets. We carried out a three-round Delphi study with stakeholders acting on the meso- and macro-levels of the German healthcare system (e.g., representatives of patient organizations, health insurance funds, politics, medical and nursing associations). In the first Delphi round, participants proposed measures to achieve the six key targets using free-text answers. The answers were analyzed with a qualitative-descriptive approach. In total, 107 stakeholders responded to the first Delphi round. After data reduction, 37 measures were extracted and grouped into six major categories: family carers, qualification, quality, public relations, services, and coordination. The range of measures on the different levels of policy, health care, and education presents a substantiated basis for the elaboration of targeted public health action plans to improve palliative care. Prioritization of measures in the second and third Delphi rounds will provide empirical support for decision making.

  20. Public Policies for ICT Update In Business: Some Key Indicators for Spain in the European Area

    Directory of Open Access Journals (Sweden)

    José Luis Vázquez

    2013-08-01

    Full Text Available Purpose—Based on the new face of business in the twenty first century, this general review is aimed at analyzing the use of information and communication technologies (ICT as social technologies by Spanish enterprises in the European context, as a result of recent policy frameworks set at communitarian and national levels.Design/methodology/approach—The paper reviews the guidelines marked by European common policies with regards to ICT update in business, just as the translation of such standards in the Spanish area. From this framework, implications of ICT adoption in the social relationships with consumers, employees, business partners and public authorities are analyzed by providing some figures in the Spanish context in comparison with the European average.Findings—The analysis supports a positive effect of national policies on Spanish enterprises’ use of social technologies in the interactions with their internal and external stakeholders, while some differences can be reported attending size and sector criteria. In this respect, ICT penetration seems to be widespread in Spanish enterprises longer than ten employees, specially within informatics, telecommunications and audiovisuals, whereas automation of interactions is moderated in micro-enterprises in the manufacture, building, retailing, and transportation sectors.Research limitations/implications—The paper offers a general overview of the use of ICT as social technologies in Spanish enterprises based on public reports. However, further research should be oriented to analyze more in deep the impact of public policies on ICT adoption and usage in business, by explaining their determining factors and comparing different clusters of counties and major regions of the world.Practical implications—The analysis reported point to the need of reinforcing the Spanish positioning in the ICT European sector in the long term. In this sense, future policy measures should be devoted to

  1. Public Policies for ICT Update In Business: Some Key Indicators for Spain in the European Area

    Directory of Open Access Journals (Sweden)

    Ana Lanero

    2011-08-01

    Full Text Available Purpose—Based on the new face of business in the twenty first century, this general review is aimed at analyzing the use of information and communication technologies (ICT as social technologies by Spanish enterprises in the European context, as a result of recent policy frameworks set at communitarian and national levels. Design/methodology/approach—The paper reviews the guidelines marked by European common policies with regards to ICT update in business, just as the translation of such standards in the Spanish area. From this framework, implications of ICT adoption in the social relationships with consumers, employees, business partners and public authorities are analyzed by providing some figures in the Spanish context in comparison with the European average.Findings—The analysis supports a positive effect of national policies on Spanish enterprises’ use of social technologies in the interactions with their internal and external stakeholders, while some differences can be reported attending size and sector criteria. In this respect, ICT penetration seems to be widespread in Spanish enterprises longer than ten employees, specially within informatics, telecommunications and audiovisuals, whereas automation of interactions is moderated in micro-enterprises in the manufacture, building, retailing, and transportation sectors.Research limitations/implications—The paper offers a general overview of the use of ICT as social technologies in Spanish enterprises based on public reports. However, further research should be oriented to analyze more in deep the impact of public policies on ICT adoption and usage in business, by explaining their determining factors and comparing different clusters of counties and major regions of the world.Practical implications—The analysis reported point to the need of reinforcing the Spanish positioning in the ICT European sector in the long term. In this sense, future policy measures should be devoted to

  2. On the Ergodic Secret-Key Agreement over Spatially Correlated Multiple-Antenna Channels with Public Discussion

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. We prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Moreover, we analyze the impact of correlation matrices on the system performance. Finally, we study the system’s performance in the two extreme power regimes. In the high-power regime, we provide closed-form expressions of the gain/loss due to correlation. In the low signal-to-noise ratio (SNR) regime, we investigate the energy efficiency of the system by determining the minimum energy required for sharing a secret-key bit and the wideband slope while highlighting the impact of correlation matrices.

  3. Key aspects of a Flemish system to safeguard public health interests in case of chemical release incidents.

    Science.gov (United States)

    Smolders, Roel; Colles, Ann; Cornelis, Christa; Van Holderbeke, Mirja; Chovanova, Hana; Wildemeersch, Dirk; Mampaey, Maja; Van Campenhout, Karen

    2014-12-15

    Although well-established protocols are available for emergency services and first-responders in case of chemical release incidents, a well-developed system to monitor and safeguard public health was, until recently, lacking in Flanders. We therefore developed a decision support system (DSS) to aid public health officials in identifying the appropriate actions in case of incidents. Although the DSS includes human biomonitoring as one of its key instruments, it also goes well beyond this instrument alone. Also other, complementary, approaches that focus more on effect assessment using in vitro toxicity testing, indirect exposures through the food chain, and parallel means of data collection (e.g. through ecosurveillance or public consultation), are integrated in the Flemish approach. Even though the DSS is set up to provide a flexible and structured decision tree, the value of expert opinion is deemed essential to account for the many uncertainties associated with the early phases of technological incidents. When the DSS and the associated instruments will be fully operational, it will provide a valuable addition to the already available protocols, and will specifically safeguard public health interests.

  4. What are the key organisational capabilities that facilitate research use in public health policy?

    Science.gov (United States)

    Huckel Schneider, Carmen; Campbell, Danielle; Milat, Andrew; Haynes, Abby; Quinn, Emma

    2014-11-28

    Literature about research use suggests that certain characteristics or capabilities may make policy agencies more evidence attuned. This study sought to determine policy makers' perceptions of a suite of organisational capabilities identified from the literature as potentially facilitating research uptake in policy decision making. A literature scan identified eight key organisational capabilities that support research use in policy making. To determine whether these capabilities were relevant, practical and applicable in real world policy settings, nine Australian health policy makers were consulted in September 2011. We used an open-ended questionnaire asking what facilitates the use of research in policy and program decision making, followed by specific questions rating the proposed capabilities. Interviews were transcribed and the content analysed. There was general agreement that the capabilities identified from the literature were relevant to real world contexts. However, interviewees varied in whether they could provide examples of experiences with the capabilities, how essential they considered the different capabilities to be and how difficult they considered the capabilities were to achieve. Efforts to improve the use of research in policy decision making are likely to benefit from targeting multiple organisational capabilities, including staff skills and competence, tools such as templates and checklists to aid evidence use and leadership support for the use of research in policy development. However, such efforts should be guided by an understanding of how policy agencies use evidence and how they view their roles, and external factors such as resource constraints and availability of appropriate research.

  5. Public health and social injustice are the key issues for the decriminalization of abortion in Mexico.

    Science.gov (United States)

    1994-01-01

    Although the Second National Abortion Survey Gallup found that 88% of Mexicans believe abortion should be a woman's choice and 77% think the decriminalization of abortion would substantially reduce maternal mortality, abortion in Mexico remains governed by a 1931 criminal code. The survey was initiated by the Information and Reproductive Choice Group to provide information for the 1994 national debate on abortion. Supporters of legal abortion note that poor women resort to unsafe pregnancy terminations without regard to the criminal status of abortion. According to Patricia Mercado, co-founder of the Reproductive Choice Group, "You can be against abortion, but still allow it to be decriminalized. In other words, criminalization does not prevent women from having abortions, it only makes then have then in bad conditions. The idea is that women should be able to decide freely without risking problems of health and social justice." Despite public support for abortion legalization, survey results indicate widespread fear about acknowledging the existence of clandestine abortion. An estimated 1-2 million illegal abortions occur each year in Mexico, yet only 26% of survey respondents would admit to knowing a woman who had undergone illegal abortion.

  6. Research of security university E-government based on public key infrastructure%公钥基础设施的高校电子政务安全研究

    Institute of Scientific and Technical Information of China (English)

    黄兰英; 叶从欢

    2013-01-01

    为了解决高校电子政务中的身份认证、访问控制、信息安全等安全问题,提出了一种基于公钥基础设施(PKI)核心技术的高校电子政务模型.该模型采用桥认证(CA)结构建立PKI信任机制,在各部门内部使用分级的CA认证,各部门之间通过中心CA进行桥接CA交叉认证;采用轻量目录访问协议(LDAP)建立PKI证书库,以目录复制(Replica)实现CA对主从LDAP的数据一致性,提高使用者的身份有效认证.该模型还采用角色及权限访问控制(RBAC)进行用户合法安全访问控制,在用户和访问权限之间引入角色,用户通过角色分配的权限来访问系统资源.此模型在实践中得以验证,符合安全要求.%A model based on the core technology in the public key infrastructure (PKI) was introduced to resolve the safety problems in the E-government affairs of colleges and universities, such as identity authentication, access control and information safety. A PKI trust mechanism was established by using the bridge certificate authentication (CA), a hierarchical CA in every internal department and the bridge CA to cross authentication between various departments through a center CA were used. A PKI certificate base was established by using the lightweight directory access protocol (LDAP) , which used directory replication to realize master-slave LDAP data consistency, so the availability of identity authentication of users was enhanced. The legal safety access of users was controlled by using role based access control (RBAC) , the role between the user and the access was introduced , then the user accessed system resources through the permissions granted to the roles. The model is proved in practice according to the safety requests and is useful for the development of the E-government affairs of colleges and universities.

  7. 基于Chebyshev的概率公钥密码体制%Probabilistic public-key cryptosystem based on Chebyshev

    Institute of Scientific and Technical Information of China (English)

    程学海; 徐江峰

    2013-01-01

    This paper introduced the definition and the properties of Chebyshev polynomial.According to the deterministic public-key cryptosystem of Chebyshev polynomial,found that it couldn't resist chosen cipher-text attacks.Combining with the security model against chosen cipher-text attacks,this paper proposed the probabilistic public-key cryptosystem of Chebyshev polynomial.The analysis show that the proposed cryptosystem is correct.Through the result of the reduction proof,the proposed cryptosystem can resist the adaptive chosen cipher-text attacks and has the IND-CCA2 security.%介绍了Chebyshev多项式的定义和相关性质,针对确定性Chebyshev多项式公钥密码体制进行了研究,发现其不能抵抗选择密文攻击.结合抵抗选择密文攻击的安全模型,提出了基于有限域的Chebyshev多项式的概率公钥密码体制,分析结果表明该密码体制是正确的.通过归约证明,该密码体制能够抵挡适应性选择密文攻击,具有抵抗选择密文攻击的IND-CCA2安全性.

  8. Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion

    KAUST Repository

    Zorgui, Marwen

    2015-06-14

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. Then, we prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem that we derive. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Finally, we analyze the impact of correlation matrices on the system performance and provide closed-form expressions of the gain/loss due to correlation in the high power regime.

  9. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal - a case study from health science.

    Science.gov (United States)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become

  10. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science

    Science.gov (United States)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become

  11. Multimode-multivariate public key cryptosystem%多模式多变量公钥密码体制

    Institute of Scientific and Technical Information of China (English)

    孙小雁; 张茂胜

    2012-01-01

    A multimode-multivariate public key cryptosystem is developed for resisting the quantum algorithm. Since quantum computers are not efficient to solve multivariate polynomial problems, the multivariate public key cryptosystem is secure. In order to improve the computational efficiency, the branching modification is used. During the process of every branch, the plus modifier, minus modifier and iteration are combined. Analysis results show that the proposed scheme can resist known types of attacks. And thus it can be applied to encryption/decryption, signature and integrity.%针对量子计算机对公钥密码体制的挑战,提出一种能抵抗量子算法的多模式多变量公钥密码算法.量子计算机在解决多变量多项式问题并无高效算法,在传统多变量公钥密码体制的基础上,使用多分支模式,在分支内部采用加模式、减模式和迭代模式,增强了多变量公钥密码体制的安全性.通过分析各种常见攻击的复杂度,多模式多变量公钥密码体制能有效抵抗各种攻击,可以应用于加解密、签名和数据完整性验证.

  12. PUBLIC KEY INFRASTRUCTURE (PKI)

    Data.gov (United States)

    Federal Laboratory Consortium — Common Access Card (CAC)Enterprise Testing Overview:Established in 2003Performs test and evaluations of the DOD PKI CAC issuance systems from an enterprise level all...

  13. PUBLIC KEY INFRASTRUCTURE (PKI)

    Data.gov (United States)

    Federal Laboratory Consortium — Common Access Card (CAC) Enterprise Testing Overview: Established in 2003 Performs test and evaluations of the DOD PKI CAC issuance systems from an enterprise level...

  14. Public assessment of key performance indicators of healthcare in a Canadian province: the effect of age and chronic health problems.

    Science.gov (United States)

    Nurullah, Abu Sadat; Northcott, Herbert C; Harvey, Michael D

    2014-01-15

    This study explores the effect of age and chronic conditions on public perceptions of the health system, as measured by the Key Performance Indicators (KPIs) of healthcare, in the province of Alberta in Canada. Drawing from data collected by Government of Alberta's Department of Health and Wellness, this research examines two key questions: (1) Do people in the 65+ age group rate the KPIs of healthcare (i.e., availability, accessibility, quality, outcome, and satisfaction) more favorably compared to people in younger age groups in Alberta? (2) Does the rating of KPIs of healthcare in Alberta vary with different chronic conditions (i.e., no chronic problem, chronic illnesses without pain, and chronic pain)? The findings indicate that people in the older age group tend to rate the KPIs of healthcare more favorably compared to younger age groups in Alberta, net of socio-demographic factors, self-reported health status, and knowledge and utilization of health services. However, people experiencing chronic pain are less likely to rate the KPIs of healthcare favorably compared to people with no chronic health problem in Alberta. Discussion includes implications of the findings for the healthcare system in the province.

  15. The Homomorphism Analysis of Public Key Cryptosystem%公钥密码体制的同态性分析

    Institute of Scientific and Technical Information of China (English)

    闫世斗; 刘念; 李子臣

    2012-01-01

    Homomorphic encryption algorithm is based on the concept of homomorphism, which is a subset ot the homomorphism. Homomorphic encryption technology can do the operation to ciphertext directly, the op- eration results can be encrypted automatically, and the technology has a very broad application in secure multi - party computation, data encryption, electronic voting and other fields. A Homomorphic property in- cludes additively homomorphism, muhiplicatively homomorphism, and mixed multiplicatively homomor- phism. We study the homomorphic property of the three public key cryptosystem widely used now, and ana- lyze Pallier cryptosystem that meets additively homomorphism, which can provide theoretical basis and guid- ance to the follow - up study of fully homomorphic encryption algorithm.%同态加密算法是基于秘密同态的概念,是秘密同态的一个子集。同态加密技术可以对加密数据直接进行运算,并且运算结果也自动加密。正是基于此,使得同态加密技术在安全多方计算、数据库加密、电子投票等领域具有广泛的应用。同态特性主要包括加法特性、乘法特性、混合乘法特性。文章对目前广泛应用的三大公钥密码体制的同态特性进行了分析,并对满足加法同态的Pallier密码体制进行了研究。为后续研究全同态加密算法提供理论基础和方法指导。

  16. Perspectives on key principles of generalist medical practice in public service in sub-saharan africa: a qualitative study

    Directory of Open Access Journals (Sweden)

    Downing Raymond V

    2011-07-01

    Full Text Available Abstract Background The principles and practice of Family Medicine that arose in developed Western countries have been imported and adopted in African countries without adequate consideration of their relevance and appropriateness to the African context. In this study we attempted to elicit a priori principles of generalist medical practice from the experience of long-serving medical officers in a variety of African counties, through which we explored emergent principles of Family Medicine in our own context. Methods A descriptive study design was utilized, using qualitative methods. 16 respondents who were clinically active medical practitioners, working as generalists in the public services or non-profit sector for at least 5 years, and who had had no previous formal training or involvement in academic Family Medicine, were purposively selected in 8 different countries in southern, western and east Africa, and interviewed. Results The respondents highlighted a number of key issues with respect to the external environment within which they work, their collective roles, activities and behaviours, as well as the personal values and beliefs that motivate their behaviour. The context is characterized by resource constraints, high workload, traditional health beliefs, and the difficulty of referring patients to the next level of care. Generalist clinicians in sub-Saharan Africa need to be competent across a wide range of clinical disciplines and procedural skills at the level of the district hospital and clinic, in both chronic and emergency care. They need to understand the patient's perspective and context, empowering the patient and building an effective doctor-patient relationship. They are also managers, focused on coordinating and improving the quality of clinical care through teamwork, training and mentoring other health workers in the generalist setting, while being life-long learners themselves. However, their role in the community, was

  17. Introduction of Renal Key Performance Indicators Associated with Increased Uptake of Peritoneal Dialysis in a Publicly Funded Health Service.

    Science.gov (United States)

    Toussaint, Nigel D; McMahon, Lawrence P; Dowling, Gregory; Holt, Stephen G; Smith, Gillian; Safe, Maria; Knight, Richard; Fair, Kathleen; Linehan, Leanne; Walker, Rowan G; Power, David A

    2017-01-01

    ♦ BACKGROUND: Increased demand for treatment of end-stage kidney disease has largely been accommodated by a costly increase in satellite hemodialysis (SHD) in most jurisdictions. In the Australian State of Victoria, a marked regional variation in the uptake of home-based dialysis suggests that use of home therapies could be increased as an alternative to SHD. An earlier strategy based solely on increased remuneration had failed to increase uptake of home therapies. Therefore, the public dialysis funder adopted the incidence and prevalence of home-based dialysis therapies as a key performance indicator (KPI) for its health services to encourage greater uptake of home therapies. ♦ METHODS: A KPI data collection and bench-marking program was established in 2012 by the Victorian Department of Health and Human Services, with data provided monthly by all renal units in Victoria using a purpose-designed website portal. A KPI Working Group was responsible for analyzing data each quarter and ensuring indicators remained accurate and relevant and each KPI had clear definitions and targets. We present a prospective, observational study of all dialysis patients in Victoria over a 4-year period following the introduction of the renal KPI program, with descriptive analyses to evaluate the proportion of patients using home therapies as well as home dialysis modality survival. ♦ RESULTS: Following the introduction of the KPI program, the net growth of dialysis patient numbers in Victoria remained stable over 4 years, at 75 - 80 per year (approximately 4%). However, unlike the previous decade, about 40% of this growth was through an increase in home dialysis, which was almost exclusively peritoneal dialysis (PD). The increase was identified particularly in the young (20 - 49) and the elderly (> 80). Disappointingly, however, 67% of these incident patients ceased PD within 2 years of commencement, 46% of whom transferred to SHD. ♦ CONCLUSIONS: Introduction of a KPI program

  18. The El-Gamal AA_{\\beta} Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem

    CERN Document Server

    Ariffin, Muhammad Rezal Kamel; Ghani, Aniza Abdul; Atan, Kamel Ariffin Mohd; Abu, Nor Azman

    2010-01-01

    The El-Gamal AA_{\\beta} Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_{\\beta}-function. The AA_{\\beta}-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \\equiv M^e (mod N) and M \\equiv C^d (mod N) in the RSA cryptosystem. It was also motivated by the add and double point operation E=kG in the elliptic curve cryptosystem. The hard mathematical problem surrounding this newly designed asymmetric cryptosystem is the NP-complete problem known as the subset sum problem. The El-Gamal AA_{\\beta} Public Key Cryptosystem mimics the El-Gamal Cryptosystem and the Elliptic Curve Cryptosystem by sending a two parameter ciphertext to the recipient.

  19. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor

    2012-01-01

    show that the distribution of Fourier coefficients for the cipher over all keys is close to ideal. Lastly, we define a practical instance of the construction with t = 2 using AES referred to as AES2. Any attack on AES2 with complexity below 285 will have to make use of AES with a fixed known key...

  20. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor

    2012-01-01

    This paper considers—for the first time—the concept of key-alternating ciphers in a provable security setting. Key-alternating ciphers can be seen as a generalization of a construction proposed by Even and Mansour in 1991. This construction builds a block cipher PX from an n-bit permutation P and...

  1. 公安网络舆情分析中的关键技术研究%Research on key technologies of public security network public opinion analysis

    Institute of Scientific and Technical Information of China (English)

    李燕

    2015-01-01

    Faced with online public opinions, It’s a practical problem which must be deeply studied and confronted for the public security organs on how to find , collect, analyze and deal with these opinions timely, and effectively enhance the credibility of the public security organization. Therefore, this article will be focused on a study related to public security methods and techniques involved in the network public opinion analysis.%面对网络舆情,公安机关如何及时发现并采集、分析并处理,切实提升公安机关的公信力,是公安机关必须深入研究和对待的现实问题。本文重点就公安网络舆情分析中涉及的相关方法和技术展开研究。

  2. Challenges, alternatives, and paths to sustainability: better public health promotion using social networking pages as key tools.

    Science.gov (United States)

    Zaidan, A A; Zaidan, B B; Kadhem, Z; Larbani, M; Lakulu, M B; Hashim, M

    2015-02-01

    This paper discusses the possibility of promoting public health and implementing educational health services using Facebook. We discuss the challenges and strengths of using such a platform as a tool for public health care systems from two different perspectives, namely, the view of IT developers and that of physicians. We present a new way of evaluating user interactivity in health care systems from tools provided by Facebook that measure statistical traffic in the Internet. Findings show that Facebook is a very promising tool in promoting e-health services in Web 2.0. Results from statistical traffic show that a Facebook page is more efficient than other pages in promoting public health.

  3. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character...... recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation...

  4. 可撤销的公钥加密方案的形式化分析%Revocable Public-Key Cryptosystems Formal Analysis

    Institute of Scientific and Technical Information of China (English)

    于瑞琴

    2011-01-01

    通常的密码系统,IBE或者PKI都必须提供从系统中撤销用户私钥的途径,同样PEKS也应该提供撤销陷门的方式.本文研究了可高效撤销的无需安全信道的带关键字搜索公钥加密方案的形式化定义及安全模型.基于BDH问题,可证明方案的安全性.%Any setting,Public-key Infrastructure or Identity-Based.Must provide a means to revoke users from the system.Efficient revocation is a well-studied problem in the traditional Public-Key Infrastructure or Identity-Based Encryption.We propose revocable public key encryption with Key words search scheme of formalized definition and the security model in the paper.Based on bilinear dilinear diffie-hellman,the security of the scheme can be proved.

  5. 基于身份的一次性盲公钥方案%One-off Blind Public Key Scheme Based on Identity

    Institute of Scientific and Technical Information of China (English)

    赵伟艇; 申远

    2012-01-01

    在现有方案的基础上,通过分析超椭圆曲线双线性对和基于身份的特点,给出了一个改进的基于身份的一次性盲公钥方案.该方案由用户和可信中心共同完成用户密钥的生成,克服了密钥托管问题,避免了由可信中心进行密钥管理所产生的安全隐患.新构造的方案能够抵抗伪造性攻击,具有不可欺骗性,又保证了一次性盲公钥的独立性,是安全可靠的.而且方案中用户在通讯时可以使用不同的公钥,解决了Internet通信中的匿名认证问题,实现了用户隐私的有效保护.%By analyzing the characteristic of the bilinear pairings on hyper-elliptic curves and identity-based cryptography, an improved one-off blind public key scheme based on the existing schemes is proposed. The scheme solves the problem of the key escrow by users and trust center generated encryption key, so it avoids security problems caused by single independent key management. The scheme is robust a-gainst the Forgery attack and ensures the independence of user's public key. This scheme is satisfied. And user's public key is different ever-y time, it can be applied to implementing internet anonymous attestation for privacy protection.

  6. ELGamal public key cryptosystem based on multiplicative group Zp*%基于乘法群Zp*的ELGamal公钥密码系统

    Institute of Scientific and Technical Information of China (English)

    孙立宏

    2011-01-01

    为了解决发送方与接收方不能识别对方身份的问题,在研究E1Gamal密码体制的基础上,给出了一种基于乘法群Zn*的ELGamal公钥密码体制。结果表明:该算法可以实现通信双方的双向身份认证,有效地防止了攻击者冒充发送方伪造要发送的消息。同时该算法在通信过程中加入了可以追踪消息来源的信息,使得接收者可以对消息的真实性进行有效的验证。通过对消息的双重保护,该体制实现了在公开信道上的安全通信。%In the public key cryptography system, the sender encrypts the messages with the recipient's public key and the receiver decrypts them with their own secret key, which results in that the two sides are unable to recognize each other. In order to solve the problem above, an ELGamal public key cryptosystem based on multiplicative group Zp* has been presented in this paper. The bidirectional identity authentication between both communications sides are supplied in the proposed algorithm, which successfully prevents the attacker sending a forged message in the identity of sender. In addition, the algorithm also adds the information to track the sources of message in the communication process, which allows the message recipients verifying the authenticity of message effectively. The system implements a secured communication in the public channel through a dual protection on message.

  7. First Chinese public hospital wins Joint Commission International accreditation: the Health Information Department played a key role in the process.

    Science.gov (United States)

    Shaffer, Audrey; Jun, Cheng Li

    2008-07-01

    Sir Run Run Shaw Hospital in Hangzhou, China spent five years preparing for a Joint Commission International accreditation survey. In March 2007 it became the first public hospital on the Chinese mainland to attain international accreditation. The Health Information Department, managed according to Western standards, played an integral role in preparing the hospital for the survey.

  8. Developing Key Performance Indicators to Measure the Effectiveness of Early Facilities Management Performance on BIM Governed Public Sector Projects

    OpenAIRE

    McAuley, Barry; Hore, Alan; West, Roger

    2015-01-01

    Governments across the globe are now recognising the need to take steps to better manage their property portfolios due to the escalating costs of operating these buildings over their lifetime. This has seen them turn towards innovative work practices and technologies offered by Building Information Modelling (BIM). It is now becoming increasingly evident that BIM can bring significant added value to the design, construction and most importantly to the operational life of a public sector devel...

  9. Dissemination of public health information: key tools utilised by the NECOBELAC network in Europe and Latin America

    Science.gov (United States)

    De Castro, Paola; Marsili, Daniela; Poltronieri, Elisabetta; Calderón, Carlos Agudelo

    2012-01-01

    Background Open Access (OA) to scientific information is an important step forward in communication patterns, yet we still need to reinforce OA principles to promote a cultural change of traditional publishing practices. The advantages of free access to scientific information are even more evident in public health where knowledge is directly associated with human wellbeing. Objectives An OA ‘consolidation’ initiative in public health is presented to show how the involvement of people and institutions is fundamental to create awareness on OA and promote a cultural change. This initiative is developed within the project NEtwork of COllaboration Between Europe and Latin American Caribbean countries (NECOBELAC), financed by the European Commission. Methods Three actions are envisaged: Capacity building through a flexible and sustainable training programme on scientific writing and OA publishing; creation of training tools based on semantic web technologies; development of a network of supporting institutions. Results In 2010–2011, 23 training initiatives were performed involving 856 participants from 15 countries; topic maps on scientific publication and OA were produced; 195 institutions are included in the network. Conclusions Cultural change in scientific dissemination practices is a long process requiring a flexible approach and strong commitment by all stakeholders. PMID:22630360

  10. 基于CPK组合公钥的电子签章技术研究%Study on Electronic Signature Technology based on Combined Public Key

    Institute of Scientific and Technical Information of China (English)

    范志强; 李成; 马兆丰; 芦效峰; 钮心忻

    2011-01-01

    With the development of e-government and e-commerce,the electronic documents have gradually replaced traditional paper-based documentation. Thus,how to ensure the security of the electronic document has become the key to the farther successful application of e-government and e-business.?The adoptions of CPK(Combined Public Key) in the design of electronic signature system and ID certificate in digital signature and verification,could make any two users confirm public key information only by their own identity labels with any dependence the trusted third party validation,thus simplifying the key exchange agreement,ensuring the documents integrity,confidentiality and undesirability,and realizing the efficient safe electronic signature system.%随着中国电子政务与电子商务的发展,电子文档已经逐渐取代传统的纸质文档。因此,如何保证电子文档的安全已经成为电子政务与电子商务进一步深入与成功应用的关键。采用组合公钥密码体制(Combined Public Key,CPK)设计电子签章系统,利用ID证书来进行数字签名与验证,使任何两个用户之间仅通过对方身份标识即可确认公钥信息,不依靠可信第三方验证,并简化了密钥交换协议,保证了文档的完整性、机密性和不可抵赖性,实现了高效安全的电子签章系统。

  11. Key points for developing an international declaration on nursing, human rights, human genetics and public health policy.

    Science.gov (United States)

    Anderson, G; Rorty, M V

    2001-05-01

    Human rights legislation pertaining to applications of human genetic science is still lacking at an international level. Three international human rights documents now serve as guidelines for countries wishing to develop such legislation. These were drafted and adopted by the United Nations Educational, Scientific and Cultural Organization, the Human Genome Organization, and the Council of Europe. It is critically important that the international nursing community makes known its philosophy and practice-based knowledge relating to ethics and human rights, and contributes to the globalization of genetics. Nurses have particular expertise because they serve in a unique role at grass roots level to mediate between genetic science and its application to public health policies and medical interventions. As a result, nurses worldwide need to focus a constant eye on human rights ideals and interpret these within social, cultural, economic and political contexts at national and local levels. The purpose of this article is to clarify and legitimate the need for an international declaration on nursing, human rights, human genetics and public health policy. Because nurses around the world are the professional workforce by which genetic health care services and genetic research protocols will be delivered in the twenty-first century, members of the discipline of nursing need to think globally while acting locally. Above all other disciplines involved in genetics, nursing is in a good position to articulate an expanded theory of ethics beyond the principled approach of biomedical ethics. Nursing is sensitive to cultural diversity and community values; it is sympathetic to and can introduce an ethic of caring and relational ethics that listen to and accommodate the needs of local people and their requirements for public health.

  12. Innovative electronic publication in plant systematics: PhytoKeys and the changes to the “Botanical Code” accepted at the XVIII International Botanical Congress in Melbourne

    Directory of Open Access Journals (Sweden)

    W. John Kress

    2011-09-01

    Full Text Available PhytoKeys was established less than a year ago in response to four main publication challenges of our time: (1 the appearance of electronic publications as amendments or even alternatives to paper publications; (2 Open Access (OA as a new publishing model; (3 the linkage of electronic registers, indices, and aggregators, which summarize information on biological species through taxonomic names or their persistent identifiers; and (4 Web 2.0 technologies, which permit the semantic markup of, and semantic enhancements to, published biological texts. The appearance of the journal was concomitant with lively discussions on the validity of nomenclatural acts published electronically (Knapp and Wright 2010, Knapp et al. 2010, Penev et al. 2010, Chapman et al. 2010. At the XVIII International Botanical Congress in Melbourne in July 2011 (IBC 2011 these discussions culminated in the decision to amend the International Code of Botanical Nomenclature to allow electronic-only publishing of new taxa. Even before the end of the Congress and formal acceptance of the changes PhytoKeys was able to publish a report on the main outcomes of the Nomenclature Section on electronic publishing (Miller et al. 2011.

  13. Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems.

    Science.gov (United States)

    Lin, Tsung-Hung; Lee, Tian-Fu

    2014-05-01

    Secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems enables two users only store their verifiers computed from their actual password in authentication server's database. Then the authentication server can verify the users' verifiers and help them to exchange electronic medical records or electronic health records securely and conveniently. This investigation presents an efficient and secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems. The proposed scheme does not use server's public keys and includes the key confirmation without extra numbers of messages and rounds. Compared to related verified-based approaches, the proposed scheme possesses higher security, has lower computational cost and fewer transmissions, and thus is suitable for the telecare medicine information systems.

  14. A parallel realization for LUC algorithm of public key cryptosystems%公钥加密算法LUC的并行实现方法

    Institute of Scientific and Technical Information of China (English)

    杜珍珍; 陆正福; 周同; 杨春尧

    2016-01-01

    LUC是基于数论的公钥密码体制,相比RSA公钥密码体制,具有能够抵抗共模攻击的优点。但LUC算法因实现难度大,运算时间长而难以用于实际加密。而影响其运算速度的主要因素是密钥长度和模幂算法。本文参考相关文献工作,得到将密钥进行分段计算的公式,而后利用LUC序列的性质将密钥进行分段计算,并在多核系统下实现了LUC并行算法,从而提高了LUC算法的执行效率。%The LUC algorithm based on the number theory is one of the public key encryption, which resists common modu-lus attack comparing with the RSA public cyptosystem. But it is difficult for practical encryption and decryption as LUC is a long time of computing task. The main factor that affects the calculation speed of LUC encryption is key length and mode power algorithm. Reviewed with related references in this paper, we deduced the expression which computed by key division segmenta-tion, then applying the mathematical properties of LUC sequences, and the LUC algorithm is computed by key division segmen-tation, which is executed parallelly by implemented on multi-core platform, consequently, the computation efficiency of LUC al-gorithm is improved.

  15. 城乡公交一体化规划的关键技术%Key Technology of Integrated Planning of Urban and Rural Public Transportation

    Institute of Scientific and Technical Information of China (English)

    王献香

    2014-01-01

    Integrated development of urban and rural passenger transport is the inevitability of the times, and it is the needs of China′s new urbanization development. Through the understanding of integration of urban and rural public transportation, the article analyzed the difference between the road passenger trans-port and public transport. Then it proposed key technologies of the urban and rural transit integrated plan-ning which are establishment of integrated rural hub system, integrated urban and rural public transporta-tion network structure, integration of urban and rural bus fare and sustainable public transport subsidy mechanism. At the same time, it studied the content of each key technology with cases.%统筹城乡客运发展是时代发展的必然性,也是我国新型城镇化发展的现实需要,通过对城乡公交一体化内涵的理解,对公路客运和公共交通之间差异性进行分析,提出城乡公交一体化规划关键技术,包括建立城乡一体的枢纽体系、城乡一体的线网结构、城乡一体票价体系和可持续的公交补贴机制,并结合案例对每项关键技术进行研究。

  16. New method to solve collusion attack and key collision in combined public key%解决组合公钥共谋攻击和密钥碰撞的新方法

    Institute of Scientific and Technical Information of China (English)

    LI Fang-wei; MA An-jun; ZHU Jiang; YU Hang

    2014-01-01

    The purpose of this paper is to solve the problem of collusion attack and key collision in combined public key crypto-system. First, for the linear collusion attacks, this paper proposed a new method to construct seed matrix, it made the sum of seeds gre%以解决组合公钥体制中共谋攻击和密钥碰撞问题为目的。首先,针对线性共谋攻击,提出了一种新的构造种子矩阵的方法,使得种子密钥和大于基点加法群的阶数,从而使密钥之间不能相互线性表示。其次在密钥的生产过程中,引入系数破坏了层不同和层互斥不同的关系,为解决选择共谋攻击提供了一种有效的方法,同时增强了抵御随机共谋攻击的能力。最后,在密钥产生的流程中,通过公钥对比来避免密钥碰撞,为解决密钥碰撞问题提出了一种新方法。

  17. Disinvestment policy and the public funding of assisted reproductive technologies: outcomes of deliberative engagements with three key stakeholder groups.

    Science.gov (United States)

    Hodgetts, Katherine; Hiller, Janet E; Street, Jackie M; Carter, Drew; Braunack-Mayer, Annette J; Watt, Amber M; Moss, John R; Elshaug, Adam G

    2014-05-05

    Measures to improve the quality and sustainability of healthcare practice and provision have become a policy concern. In addition, the involvement of stakeholders in health policy decision-making has been advocated, as complex questions arise around the structure of funding arrangements in a context of limited resources. Using a case study of assisted reproductive technologies (ART), deliberative engagements with a range of stakeholder groups were held on the topic of how best to structure the distribution of Australian public funding in this domain. Deliberative engagements were carried out with groups of ART consumers, clinicians and community members. The forums were informed by a systematic review of ART treatment safety and effectiveness (focusing, in particular, on maternal age and number of treatment cycles), as well as by international policy comparisons, and ethical and cost analyses. Forum discussions were transcribed and subject to thematic analysis. Each forum demonstrated stakeholders' capacity to understand concepts of choice under resource scarcity and disinvestment, and to countenance options for ART funding not always aligned with their interests. Deliberations in each engagement identified concerns around 'equity' and 'patient responsibility', culminating in a broad preference for (potential) ART subsidy restrictions to be based upon individual factors rather than maternal age or number of treatment cycles. Community participants were open to restrictions based upon measures of body mass index (BMI) and smoking status, while consumers and clinicians saw support to improve these factors as part of an ART treatment program, as distinct from a funding criterion. All groups advocated continued patient co-payments, with measures in place to provide treatment access to those unable to pay (namely, equity of access). Deliberations yielded qualitative, socially-negotiated evidence required to inform ethical, accountable policy decisions in the specific

  18. 一种基于多变量公钥的软件注册方案%A SOFTWARE REGISTRATION SCHEME BASED ON MULTIVARIATE PUBLIC KEY

    Institute of Scientific and Technical Information of China (English)

    黄宁

    2013-01-01

    对中间域多变量公钥密码算法MFE(Medium-Field Multivariate Public Key Encryption)可能遇到的奇异性进行分析和处理,并研究其应用于软件注册。用改进的MFE多变量公钥密码算法,在扩展ASCⅡ字符集构建的有限域F(28)中,设计软件注册方案,运算过程多处采用了不可更改的机器指纹信息,实现一次一密,为了提高安全性,在注册码的形成过程中对字符进行分解;而在注册码的验证过程中对字符进行合成,抗代数攻击能力得到提高。由于注册码对机器指纹信息的依赖,有效防止多机共享注册码。%We analyse and process the singularity which might be encountered by MFE(medium-field multivariate public key encryption)and study the application of it in software registration.We use the enhanced MFE multivariate public key encryption to design a software registration scheme in finite field F (28 )configured from the character set of extended ASCII,which uses unchangeable fingerprints of machine in several steps of operation,and realises one key used for just one time.In order to enhance the security,characters are decomposed in the process of registration string generation,and then are composed in the process of registration string verification,thus the ability to withstand the algebraic attacks is enhanced. The dependence of registration string on machine fingerprints effectively prevents any registration string from being shared by multiple machines.

  19. 基于广域特征关联的公钥高深度加密方案%Method of Public-Key Deep Encryption Based on Public Characteristic Correlation

    Institute of Scientific and Technical Information of China (English)

    赵晓津

    2014-01-01

    研究基于广域特征关联的标准模型下伪装网络入侵容忍公钥高深度加密方案,提出一种基于特征关联的公钥加密方案,通过对入侵网络数据进行特征分析的方法,提取入侵数据的原始特征,在此基础上,通过特征关联的方法对公钥进行加密,大大提高了破解难度;采用一段随机的文本进行性能测试,结果显示,与传统加密方案相比较,所提加密方案具有更高的加密深度和解密正确率,且加密后文本容量较小,基本不影响系统处理和传输,具有很好的应用价值。%Study on the method of public-key deep encryption in standard intrusion tolerant model. A method of public-key encryption in standard intrusion tolerant model was proposed, the input data was analyzed with characteristic extrac-tion, and then, the public-key encryption was done with characteristic correlation, and with which, it was more difficult to break. A random text in this paper was taken as target to test the ability of encrypting and breaking, the result shows that compared with traditional method, the new method has a higher ability for encryption and a higher rate of break, the text size after encryption is similar with original, so it does not affect the process and transmission, it will be applied widely.

  20. Implications for alcohol minimum unit pricing advocacy: what can we learn for public health from UK newsprint coverage of key claim-makers in the policy debate?

    Science.gov (United States)

    Hilton, Shona; Wood, Karen; Patterson, Chris; Katikireddi, Srinivasa Vittal

    2014-02-01

    On May 24th 2012, Scotland passed the Alcohol (Minimum Pricing) Bill. Minimum unit pricing (MUP) is an intervention that raises the price of the cheapest alcohol to reduce alcohol consumption and related harms. There is a growing literature on industry's influence in policymaking and media representations of policies, but relatively little about frames used by key claim-makers in the public MUP policy debate. This study elucidates the dynamic interplay between key claim-makers to identify lessons for policy advocacy in the media in the UK and internationally. Content analysis was conducted on 262 articles from seven UK and three Scottish national newspapers between 1st May 2011 and 31st May 2012, retrieved from electronic databases. Advocates' and critics' constructions of the alcohol problem and MUP were examined. Advocates depicted the problem as primarily driven by cheap alcohol and marketing, while critics' constructions focused on youth binge drinkers and dependent drinkers. Advocates justified support by citing the intervention's targeted design, but critics denounced the policy as illegal, likely to encourage illicit trade, unsupported by evidence and likely to be ineffective, while harming the responsible majority, low-income consumers and businesses. Critics' arguments were consistent over time, and single statements often encompassed multiple rationales. This study presents advocates with several important lessons for promoting policies in the media. Firstly, it may be useful to shift focus away from young binge drinkers and heavy drinkers, towards population-level over-consumption. Secondly, advocates might focus on presenting the policy as part of a wider package of alcohol policies. Thirdly, emphasis on the success of recent public health policies could help portray the UK and Scotland as world leaders in tackling culturally embedded health and social problems through policy; highlighting past successes when presenting future policies may be a valuable

  1. Audio Information Hiding Algorithm Based on Knapsack Public-key%一种基于背包公钥的语音信息隐藏算法

    Institute of Scientific and Technical Information of China (English)

    付喜辉; 丁文龙

    2011-01-01

    针对在传榆语音秘密信息过程中存在破坏或窃取的问题,提出一种鲁棒性较强的信息隐藏方法.把一段语言作为秘密信息隐藏到宿主音频中,在公共信道中传递秘密信息.该算法是根据人类听觉系统在小波域中嵌入秘密信息,并且利用背包公钥可以使隐藏的信息具有加密功能.对于外界的噪声、压缩、滤波干扰有很强的抗干扰能力.%Secret audio message has to experience all kinds of attacks during transporting. This paper presents a steganography algorithm with strong robustness. It embeds a speech as the secret message into original audio signal, and transmits the secret message in the public channel. The algorithm makes use of Human Auditory System (HAS) characteristics and embeds secret message in the wavelet domain. With knapsack public-key, the algorithm not only encrypts the hiding information but also encrypting the information. It also has strong anti-disturbance ability against noise, compression and filter.

  2. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  3. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  4. Quantum key management

    Science.gov (United States)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  5. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  6. Ready-to-eat cereals are key sources of selected micronutrients among schoolchildren from public and private elementary schools in Quetzaltenango, Guatemala.

    Science.gov (United States)

    Montenegro-Bethancourt, Gabriela; Vossenaar, Marieke; Kuijper, Lothar D; Doak, Colleen M; Solomons, Noel W

    2009-05-01

    This cross-sectional dietary survey aimed to assess the consumption and relative nutrient contribution of ready-to-eat cereals (RTEC) among schoolchildren from 2 social classes in an urban center in the Guatemalan province of Quetzaltenango. A total of 449 24-hour dietary records were collected using a pictorial workbook registry method among third- and fourth-grade schoolchildren. The sample population was divided between low-income, public school attendants (n = 219) and students from higher-income private institutions (n = 230). We described the contribution of RTEC to estimated total energy; carbohydrates; protein; fat; vitamins A, C, and D; thiamin; riboflavin; folate; calcium; iron; and zinc over the 24-hour interval of registry. Approximately 41% of the subjects mentioned RTEC at least once in their 24-hour record; 93% of these at breakfast time. From the 7 RTEC varieties reported, 4 were presweetened. Estimated cereal consumption was significantly higher among private school participants (P < .001). The RTEC contributed 2.4% of estimated total energy across the whole sample and 3.6% of total carbohydrate; iron intake from RTEC was 21% of total, whereas less than 1% of calcium intake came from this source. Among the subgroup of cereal consumers, RTEC accounted for more than 40% of their daily recommendation intake for iron, vitamin C, thiamin, and riboflavin. The RTEC consumers had significantly higher intakes for all nutrients except carbohydrate and riboflavin as compared with nonconsumers. This study demonstrates the importance of RTEC as a key source of several selected micronutrients to schoolchildren's diet in this setting.

  7. Intelligent policy making? Key actors' perspectives on the development and implementation of an early years' initiative in Scotland's public health arena.

    Science.gov (United States)

    Deas, L; Mattu, L; Gnich, W

    2013-11-01

    Increased political enthusiasm for evidence-based policy and action has re-ignited interest in the use of evidence within political and practitioner networks. Theories of evidence-based policy making and practice are being re-considered in an attempt to better understand the processes through which knowledge translation occurs. Understanding how policy develops, and practice results, has the potential to facilitate effective evidence use. Further knowledge of the factors which shape healthcare delivery and their influence in different contexts is needed. This paper explores the processes involved in the development of a complex intervention in Scotland's National Health Service (NHS). It uses a national oral health programme for children (Childsmile) as a case study, drawing upon key actors' perceptions of the influence of different drivers (research evidence, practitioner knowledge and values, policy, and political and local context) to programme development. Framework analysis is used to analyse stakeholder accounts from in-depth interviews. Documentary review is also undertaken. Findings suggest that Childsmile can be described as an 'evidence-informed' intervention, blending available research evidence with knowledge from practitioner experience and continual learning through evaluation, to plan delivery. The importance of context was underscored, in terms of the need to align with prevailing political ideology and in the facilitative strength of networks within the relatively small public health community in Scotland. Respondents' perceptions support several existing theoretical models of translation, however no single theory offered a comprehensive framework covering all aspects of the complex processes reported. Childsmile's use of best available evidence and on-going contribution to knowledge suggest that the programme is an example of intelligent policy making with international relevance.

  8. ZooKeys, unlocking Earth’s incredible biodiversity and building a sustainable bridge into the public domain: From “print-based” to “web-based” taxonomy, systematics, and natural history. ZooKeys Editorial Opening Paper

    Directory of Open Access Journals (Sweden)

    Lyubomir Penev

    2008-07-01

    Full Text Available Publishing taxonomic and systematics studies in the digital era faces major challenges and requires new approaches, many of which are currently stimulating spirited discussions amongst taxonomists and systematists. New amendments to the International Code of Zoological Nomenclature are expected to regulate electronic publishing of new taxa and create a standard form for their registration (ZooBank. Responding to a perceived need, this editorial announces establishment of ZooKeys – a new online and print journal in zoological taxonomy and systematics, which aims to quickly respond and adapt to the newest developments in taxonomic publishing. Open Access is accepted as mandatory for ZooKeys. Th e rationale for and concept of ZooKeys is discussed in detail.

  9. The Development of Key Performance Indicators to Monitor Early Facilities Management Performance Through the Use of BIM Technologies in Public Sector Projects

    OpenAIRE

    McAuley, Barry; Hore, Alan; West, Roger

    2015-01-01

    One of the biggest threats faced by governments in delivering greater efficiency on public works is the need for the public sector to have an enhanced physical environment to operate from. The physical environment can either enhance or impede worker productivity, therefore contributing to its bottom line profits and success of the organisation. This has now resulted in the AEC sector witnessing the development and adoption of Building Information Modelling (BIM), so as to ensure a new level o...

  10. A Matter of Trust: Ten Key Insights from Recent Public Opinion Research on Attitudes about Education among Hispanic Parents, Students and Young Adults

    Science.gov (United States)

    Gasbarra, Paul; Johnson, Jean

    2008-01-01

    In many respects, Hispanic families share the aspirations and anxieties of many other families nationwide: They are keenly focused on the role completing high school and going to college will play in their children's future. Students and young adults see success in school and college as key to interesting work and a prosperous future, and most are…

  11. PUBLIC KEY ENCRYPTION WITH MULTI-KEYWORD SEARCH BASED ON IPE%基于内积加密的支持多关键字检索的公钥加密方案

    Institute of Scientific and Technical Information of China (English)

    刘蓬涛

    2013-01-01

    Public-key encryption with multi-keyword search (PEMKS) is the extension of the public-key encryption with keyword search (PEKS),it can support the receiver to search all subsets of keywords embedded in the ciphertext.In this paper,we construct a PEMKS scheme by using inner-product encryption (IPE) scheme aiming at the problems of multi-keyword search in public key encryption as well as ciphertext length,and give the security analysis on it.%支持多关键字检索的公钥加密(PEMKS)是支持关键字检索的公钥加密(PEKS)的扩展,能够支持接收者对嵌入密文中的所有关键字的子集进行检索.针对公钥加密中的多关键字检索以及密文长度问题,利用内积加密方案构造一个支持多关键字检索的公钥加密方案并给出安全性分析.

  12. Key Statistics on Public Elementary and Secondary Education Reported by State and by Regional, Locale, and Wealth Clusters, 1987-88. Survey Report.

    Science.gov (United States)

    Davis, Jo Ann

    Regional and subregional division characteristics of public elementary and secondary education in the United States are reported. Characteristics associated with urbanicity and wealth are also reported. Factors examined are those most commonly used to identify the resources, needs, organization, and special characteristics of education within each…

  13. Key points of ifre protection analysis of public places of entertainment%公共娱乐场所的消防防火要点分析

    Institute of Scientific and Technical Information of China (English)

    张伟

    2015-01-01

    Now the number of public places of entertainment is increasing.When people relax in public places,they will ignore the safety hazard.This article will start with the definition and characteristics of public entertainment,analyze and study the hidden fire hazards,and put forward the fire prevention and fire prevention and management measures,in order to provide reference and reference for the elimination of public entertainment places.%现在公共娱乐场所数量与日俱增。人们在公共娱乐场所放松时,会忽视安全隐患。本文将从公共娱乐场所界定及其火灾特点入手,分析和研究公共场所存在的火灾隐患,最后提出消防防火要点及管理措施,以期为消除公共娱乐场所安全隐患提供参考和借鉴。

  14. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  15. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  16. Key Theories from Critical Medical Anthropology for Public Health Research. Part II: Medicine in the Social System, Medicine as a Social System

    Directory of Open Access Journals (Sweden)

    Jennifer J. Carroll

    2014-06-01

    Full Text Available This article summarizes four significant theoretical concepts from the field of Critical Medical Anthropology in two parts: in the first part, biopower/discipline and explanatory models; in the second, structural violence, and identity politics and biological citizenship. The four subjects reviewed here have been chosen for their importance to our understanding of human behaviors related to health and illness, as well as for the impact that they can have on theory, research, and practice in the field of public health. These critical theories can provide new ways of thinking about professional roles, medical decisions, disease diagnosis and etiology, treatment adherence, prevention messaging, and all sorts of health-related behaviors and systems of understanding. They can also help public health researchers shed light on the human beliefs and activities that shape patterns of disease within and across populations. Whether a research question is being formulated or research findings are being analyzed, the critical social theories outlined here can foster a more holistic understanding of the human element in any public health project.

  17. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  18. Pre-certification based technology solution for fast switching authentication in wireless Mesh network%基于预认证的无线M esh网络快速切换认证技术方案

    Institute of Scientific and Technical Information of China (English)

    张钧媛; 郑小芳

    2015-01-01

    为了保证无线Mesh网络链路切换过程的快速与安全性,运用了CPK标识认证技术,参照了IKEv2认证与密钥交换协议的设计方法,按照安全协议设计原则,设计了基于预认证的无线Mesh网络快速认证技术方案,包括基于预认证的端到端认证与加密方案和快速重认证方案。通过方案性能与安全性分析,方案在实现安全快速的同时还兼具了很好的性能。%In order to ensure the celerity and security in link switching process of wireless Mesh network,the CPK identity authentication technology is used and the design method of IKEv2 authentication and key exchange protocol is referred. The pre⁃certification based technology solution for fast switching authentication in wireless Mesh network is designed according to the se⁃curity protocol design principle. The solution includes two parts,end⁃to⁃end authentication and encryption scheme based on pre⁃certification and fast re⁃authentication scheme. The analyses of the scheme performance and security show that the scheme is characterized by celerity and security as well as good performance.

  19. Research capacity and culture of the Victorian public health allied health workforce is influenced by key research support staff and location.

    Science.gov (United States)

    Williams, Cylie; Miyazaki, Koki; Borkowski, Donna; McKinstry, Carol; Cotchet, Matthew; Haines, Terry

    2015-06-01

    The aim of the present study was to identify and understand the self-rated research capacity and culture of the allied health workforce. METHODS. The present study was a cross-sectional survey. The Research Capacity and Culture tool was disseminated to all Victorian public health allied health departments. General demographic data were also collected, including the presence of an organisational allied health research lead. Five hundred and twenty fully completed surveys were returned by participants; all allied health disciplines and all grades were represented. One hundred and eighty-six participants had an organisational allied health research lead and 432 were located in a metropolitan-based health service. There were significant differences (P organisational and team research skills between those with and without a research lead, together with those in different service locations (metropolitan vs non-metropolitan). Higher self-ratings in individual research skills (P organisational level has a flow-down effect on research capacity and culture.

  20. 卫生应急关键技术筛选框架设计与结果分析*%Research on the Framework Design of Selecting Key Techniques of Public Health Emergency Response and the Analysis of Results

    Institute of Scientific and Technical Information of China (English)

    吴群红; 胥娇; 郝艳华; 宁宁

    2013-01-01

      目的:探讨卫生应急关键技术概念、内涵、筛选框架、原则及方法。方法:运用头脑风暴法及专题讨论法,构建卫生应急关键技术筛选框架,通过议题小组法明确卫生应急关键技术筛选标准,运用德尔菲法筛选关键技术。结果:设计了基于突发公共卫生事件分类、生命周期处置流程、技术层次、技术范畴的四维卫生应急关键技术研究框架,通过平均算术法和秩和法筛选了包括一级、二级技术在内的9大类共59项基层迫切需要的卫生应急关键技术集。结论:卫生应急关键技术的框架设计和筛选方法具有科学性、实用性和可操作性,研究可为今后进一步遴选、研究和开发关键技术提供概念框架和工具指南。%Objective: To explore the concept, connotation, selection framework, principles and methods of selecting the key techniques of health emergency. Methods: By using method of brainstorming and focused group discussion, the framework of selecting the key techniques of public health emergency was constructed, the criteria for key techniques selection was developed through nominal group discussion method;then a set of key techniques were identified through nominal group discussion method. Results:The framework for selecting key techniques was designed based on four dimensions: the classification of emergency events, life cycle of emergency response, level of techniques and technique category; based on the results of arithmetic average and rank sum method, 59 key techniques out of 9 types were selected. Conclusion: Selection framework and method of public health emergency key techniques are scientific, feasible, and applicable, which provide the conceptual framework and guideline for further research.

  1. 基于McEliece公钥密码体制的盲签名算法研究%Blind Signature Scheme Based on McEliece Public Key Cryptosystem

    Institute of Scientific and Technical Information of China (English)

    赵程程; 李子臣; 刘念; 阎晓妲

    2012-01-01

    Due to the threat of quantum computer on public - key cryptography, the public key cryptosystems against quantum computing has become the focus of research in information security field. A blind sig- nature based on McEliece public key cryptography was proposed aiming at protecting of consumers'anonymi- ty. By Hash on a message and blind process ensure signed message and behavior cannot be linked. At the same time the signature of receiver's identity is kept secret and will never be leaked out, with unconditional intractability and security for this kind of blind signature is analyzed. Result shows that this model has the advantages of inheriting the security of McEliece public-key cryptography, having the general basic proper- ties of digital signatures and blind signatures, resisting quantum computer attack and eventually has a very strong security.%由于量子计算机对现用公钥密码体制的威胁,抵抗量子计算的公钥密码体制已经成为信息安全领域研究的重点。针对消费者的匿名性保护问题,本文提出一种基于McEliece公钥密码体制的盲签名算法。通过对消息进行Hash,盲化和去盲过程,保证签名的消息与签署行为不可链接,且永远不会被泄露,具有无条件不可追踪性。文章还对这种盲签名的安全性进行分析,分析结果表明,此模型既继承了McEliece公钥密码体制的安全性,能抵抗量子计算机的攻击,也具有一般数字签名和盲签名的基本性质,具有很强的安全性。

  2. Propuesta de aplicación de un sistema de Infraestructura de Clave Pública (Public Key Infrastructure "PKI" y los Certificados Digitales en la trazabilidad de productos agrícolas

    Directory of Open Access Journals (Sweden)

    Juan Carlos Sepúlveda Peña

    2009-01-01

    Full Text Available Hoy día la trazabilidad de los productos y las actividades en la cadena de suministro se han convertido en un nuevo factor a tener en cuenta en la cadena de distribución de alimentos y la agroindustria. Cada vez más, consumidores en muchas partes del mundo demandan de pruebas verificables de trazabilidad como uno criterio importante de la calidad / inocuidad de los productos alimenticios. El presente artículo propone una solución a esta problemática introduciendo el uso de un sistema de Infraestructura de Clave Pública (Public Key Infrastructure "PKI" y los certificados digitales (CD.

  3. Health statistics - Key data on health 2002 (Data 1970-2001 Luxembourg: Office for Official Publications of the European Communities,2002

    Directory of Open Access Journals (Sweden)

    Antonio G. de Belvis

    2004-06-01

    Full Text Available

    Since 1990s, the European institutions have been discussing on the importance to establish a Health
    Indicators Monitoring System.

    This system would: undertake a “critical review of existing health data and indicators; develop appropriate methods for the collection of the progressively comparable health data needed to establish these indicators; develop a reliable system for the transfer and sharing of health data and indicators, essentially by means of the telematic interchange of data; identify methods and tools required for conducting analyses and producing reports on state of health, trends and determinants, and the impact of health-related policies” (according to the speech made by the European Commission representative, Mr. Frédéric Sicard, during the former EUPHA Conference held in Rome, last November.
    These are the outcomes of the Health statistics — Key data on health 2002, issued on March 8th 2004 and prepared by the Office for National Statistics (ONS, United Kingdom, and the sector ‘Health and safety’, of Unit E.3 (Education, health and culture of Eurostat, on behalf of the European Commission.

  4. Depth keying

    Science.gov (United States)

    Gvili, Ronen; Kaplan, Amir; Ofek, Eyal; Yahav, Giora

    2003-05-01

    We present a new solution to the known problem of video keying in a natural environment. We segment foreground objects from background objects using their relative distance from the camera, which makes it possible to do away with the use of color for keying. To do so, we developed and built a novel depth video camera, capable of producing RGB and D signals, where D stands for the distance to each pixel. The new RGBD camera enables the creation of a whole new gallery of effects and applications such as multi-layer background substitutions. This new modality makes the production of real time mixed reality video possible, as well as post-production manipulation of recorded video. We address the problem of color spill -- in which the color of the foreground object is mixed, along its boundary, with the background color. This problem prevents an accurate separation of the foreground object from its background, and it is most visible when compositing the foreground objects to a new background. Most existing techniques are limited to the use of a constant background color. We offer a novel general approach to the problem with enabling the use of the natural background, based upon the D channel generated by the camera.

  5. Promoting awareness of key resources for evidence-informed decision making in public health: An evaluation of a webinar series about knowledge translation methods and tools

    Directory of Open Access Journals (Sweden)

    Jennifer eYost

    2016-04-01

    awareness and stimulating use of resources for evidence-informed decision making and knowledge translation in public health practice.

  6. Promoting Awareness of Key Resources for Evidence-Informed Decision-making in Public Health: An Evaluation of a Webinar Series about Knowledge Translation Methods and Tools.

    Science.gov (United States)

    Yost, Jennifer; Mackintosh, Jeannie; Read, Kristin; Dobbins, Maureen

    2016-01-01

    stimulating use of resources for evidence-informed decision-making and knowledge translation in public health practice.

  7. Public-key Encryption Based on Extending Discrete Chebyshev Polynomials' Definition Domain to Real Number%基于实数域扩散离散Chebyshev多项式的公钥加密算法

    Institute of Scientific and Technical Information of China (English)

    陈宇; 韦鹏程

    2011-01-01

    将Chebyshev多项式与模运算相结合,对其定义在实数域上进行了扩展,经过理论验证和数据分析,总结出实数域多项式应用于公钥密码的一些性质.利用RSA公钥算法和EIGamal公钥算法的算法结构,提出基于有限域离散Chebyshev多项式的公钥密码算法.该算法结构类似于RSA算法,其安全性基于大数因式分解的难度或者与El-Gamal的离散对数难度相当,能够抵抗对于RSA的选择密文攻击,并且易于软件实现.%By combining Chebyshev polynomials with modulus compute,extending Chebyshev polynomials' definition domain to real number, some conclusions were drawn by theoretic verification and data analysis. Making use of the framework of the traditional public-key algorithm RSA and ElGamal, proposed a chaotic public-key encryption algorithm based on extending discrete Chebyshev polynomials' definition domain to Real number. Its security is based on the intractability of the integer factorization problem as RSA,and it is able to resist the chosen cipher-text attack against RSA and easy to be implemented.

  8. 对短公钥的基于身份数字签名算法的安全性攻击∗%Attacks on Identity-based Digital Signature Algorithm with Short Public Key

    Institute of Scientific and Technical Information of China (English)

    郑红; 范佳

    2015-01-01

    An identity-based digital signature scheme with short public key is discussed. Two kinds of attacks on this algorithm indi-cates that this algorithm could not fairly satisfy the claimed security requirement. More specifically, Type I attacker could calculate all other users′valid private keys, if he gets one user′s private key. Type II attacker is able to forge a user′s signature on any other messa-ges if he gets this user′s one signature.%研究了一个具有短公钥特征的基于身份的数字签名算法。通过两种安全性攻击,指出该算法并不满足其所声称的安全性。运用第一种攻击,如果攻击者获得某个用户私钥,则他可以计算系统内所有其他用户的合法私钥。运用第二种攻击,如果攻击者获得了某个用户的一个合法签名,则他可以伪造该用户对任意其他消息的合法签名。

  9. New Public Key Certificate Revocation Scheme Based on One-way Hash Chain%基于单向散列链的公钥证书撤销机制

    Institute of Scientific and Technical Information of China (English)

    李景峰; 潘恒; 祝跃飞

    2006-01-01

    证书撤销是公钥基础设施(PKI,Public Key Infrastructure)研究和应用的难点问题.本文首先讨论了当前应用最广泛的两类证书撤销机制-证书撤销列表(CRL, Certificate Revocation List)和在线证书状态协议(OCSP, Online Certificate Status Protocol),剖析了这两种机制各自存在的不足.在此基础上,提出了一种基于单向散列链的证书撤销机制.

  10. New QC-LDPC codes based Niederreiter cryptography scheme by using dual public-key%基于QC-LD PC码的双公钥 Niederreiter密码方案

    Institute of Scientific and Technical Information of China (English)

    李冲; 韩益亮

    2016-01-01

    As an important research ofpost-quantum cryptography,code-based cryptography had excellent characteristics of low complexity and high security.With the code-based cryptosystem as the core knowledge,we constructed a new QC-LDPC codes based Niederreiter cryptography scheme by using dual public-key.And the safety analysis shows that the new scheme not only resists the common method of attack,but also meets the IND-CCA2 security.The analysis of performance of the scheme is also given.We can get the conclusions that public key sizes reduce by 63%and the information rate increase by 47%.%基于编码的公钥密码体制作为抗量子攻击密码理论的重要研究内容,具有加/解密复杂性低和安全性高的优异特性。针对Niederreiter公钥密码体制进行了研究,利用QC-LDPC码和双公钥的相关知识构造了一种新的Niederreiter加密方案。安全性分析表明,加密方案能抵抗常见攻击方法的同时满足随机预言机模型下的IND-CCA2安全。最后对方案的性能进行分析,较原有Niederreiter密码的公钥量减少63%和信息率提高47%的结论。

  11. 基于公开密钥算法的移动位置隐私保护%Protecting mobile location privacy based on public-key cryptographic algorithm

    Institute of Scientific and Technical Information of China (English)

    陈渝文; 李晓宇

    2016-01-01

    为保证位置信息查询服务的安全性和保密性,提出基于公开密钥算法的移动位置隐私保护方法.引入混淆服务器,用地理位置信息服务器的公有密钥加密用户发出的查询,经过混淆服务器转发给地理位置信息服务器.由于查询经过加密,所以混淆服务器不知道用户查询的内容和当前的位置信息,地理位置信息服务器知道有用户查询,但不知道用户的实体信息.实验结果表明,该方法能够以很小代价更好地保护用户的位置隐私.%To ensure the security and confidentiality of location based services,a mobile location privacy protection method based on public-key cryptography was presented.A confusion server was introduced.Queries issued by the users were encrypted with the public key of location information server,which were forwarded by the confusion server to location information server.The method can protect user's location privacy,because the query is encrypted,the confusion server does not know the contents of the user's query and the current location information.Location information server only knows the query,but does not know user's entity information.The experimental results show that the method can protect the user's location privacy better with marginal cost.

  12. ClaimChain: decentralized public key infrastructure

    OpenAIRE

    Kulynych, Bogdan

    2017-01-01

    La infraestructura de clave pública (PKI) es un componente necesario para el funcionamiento de las comunicaciones seguras modernas. Esta infraestructura permite a los miembros participantes establecer claves criptográficas para sus destinatarios, manteniendo relaciones de alta integridad entre usuarios (nombres, direcciones u otros identificadores) y las claves públicas utilizadas para cifrar y verificar los mensajes. Los sistemas PKI existentes presentan diferentes concesio...

  13. Approximate Public Key Authentication with Information Hiding

    Energy Technology Data Exchange (ETDEWEB)

    THOMAS,EDWARD V.; DRAELOS,TIMOTHY J.

    2000-10-01

    This paper describes a solution for the problem of authenticating the shapes of statistically variant gamma spectra while simultaneously concealing the shapes and magnitudes of the sensitive spectra. The shape of a spectrum is given by the relative magnitudes and positions of the individual spectral elements. Class-specific linear orthonormal transformations of the measured spectra are used to produce output that meet both the authentication and concealment requirements. For purposes of concealment, the n-dimensional gamma spectra are transformed into n-dimensional output spectra that are effectively indistinguishable from Gaussian white noise (independent of the class). In addition, the proposed transformations are such that statistical authentication metrics computed on the transformed spectra are identical to those computed on the original spectra.

  14. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receive...

  15. Fast and secure handover of intra-ASN IEEE802.16 network by proposed certificate based pre-authentication

    Science.gov (United States)

    Sridevi, B.; Supriya, T. S.; Rajaram, S.

    2013-01-01

    The current generation of wireless networks has been designed predominantly to support voice and more recently data traffic. WiMAX is currently one of the hottest technologies in wireless. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost and handover delay since on each handoff the Mobile Station (MS) has to undergo all steps of authentication. Pre-Authentication is used to reduce the handover delay and increase the speed of the Intra-ASN Handover. Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre authenticated by central authority called Pre Authentication Authority (PAA). MS requests PAA for Pre Authentication Certificate (PAC) before performing handoff. PAA verifies the identity of MS and provides PAC to MS and also to the neighboring target Base Stations (tBSs). MS having time bound PAC can skip the authentication process when recognized by target BS during handoff. It also prevents the DOS (Denial Of Service) attack and Replay attack. It has no wastage of unnecessary key exchange of the resources. The proposed work is simulated by NS2 model and by MATLAB.

  16. 基于RO模型的公钥加密方案安全性分析与证明%Analysis and Proving of the Security on Public Key Scheme Based on RO Model

    Institute of Scientific and Technical Information of China (English)

    黄贻望; 袁科; 杨英杰

    2012-01-01

    Information Security is the fundamentality of the security society,but the cryptography is the key technology of information seCurity, so the security of design and application to crypto scheme or protocol becomes the most focus issue for people.First,this paper introduction the RO model,correlation induction judgement and define adversary model,then analyzing and proving the security of the scheme of public key with this model,and achieved the expectation result.%信息安全是信息社会存在的根基,而密码学是信息安全技术的核心部分,因此,对密码方案或协议的设计与应用的安全性成为人们最为关注的问题。本文首先介绍随机预言模型(RO)及相关的归约论断和敌手模型定义,并运用这种模型对公钥加密方案进行了安全性分析,同时给出了证明,结果达到预期的安全性目标。

  17. Efficient Quantum Key Distribution

    CERN Document Server

    Ardehali, M; Chau, H F; Lo, H K

    1998-01-01

    We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in public. As the number of transmitted signals increases, the efficiency of our scheme can be made to approach 100%. The security of our scheme (against single-photon eavesdropping strategies) is guaranteed by a refined analysis of accepted data which is employed to detect eavesdropping: Instead of lumping all the accepted data together to estimate a single error rate, we separate the accepted data into various subsets according to the basis employed and estimate an error rate for each subset individually. Our scheme is the first quantum key distribution with an efficiency greater than 50%. We remark that our idea is rath...

  18. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  19. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  20. 公共制造云服务平台架构及其支撑技术研究%Research of structure and key technologies for public manufacturing cloud service platform

    Institute of Scientific and Technical Information of China (English)

    张倩; 齐德昱

    2013-01-01

    To make small and medium enterprises(SME) fully enjoy the benefits brought by the cloud manufacturing,this paper analyzed the operating principle of public manufacturing cloud,and proposed the structure of public manufacturing cloud service platform for the SME,as well as its formal description.It discussed several key technologies such as cloud manufacturing resource management,collaborative design,and QoS management.Based on the multi-level hierarchical control structure,it constructed a cloud manufacturing resource management and monitoring model.It also built a service-oriented virtual collaborative design environment based on the infrastructure of the platform,which could support the design of complex product.The operation model of the platform shows that the proposed platform is applicable and exemplary.%为了能使量大面广的中小企业充分享受云制造的益处,分析了公共制造云的运行原理,搭建了一个面向中小企业的公共制造云服务平台架构,并给出了其形式化描述.对平台所涉及的关键支撑技术如云制造资源管理、协同设计及QoS管理进行分析,提出了基于多级递阶控制结构的云制造资源管理与监控模型,以及在云制造基础设施之上构建了支持复杂产品设计、面向服务的虚拟协同设计环境.最后通过公共制造云服务平台运作模型说明了平台的应用性和示范性.

  1. Reforming profit-seeking mechanism is the key to public hospital reform%破除逐利机制是公立医院改革的关键

    Institute of Scientific and Technical Information of China (English)

    钟东波

    2015-01-01

    逐利机制是我国公立医院诸多问题的总根源,破除逐利机制是公立医院改革的关键。逐利机制不是公立医院自主追求的结果,而是政府一系列政策选择的意外结果。逐利机制有三个主要环节:创收压力机制、成本放大机制和收入挂钩机制。因而,破除公立医院逐利机制也应从此三个方面着手综合施策,而改革收入挂钩机制是其中具有决定意义的环节。%The profit-seeking mechanism which has emerged as an unexpected result of a series of policy choices during the market-oriented healthcare reform is the root cause of almost all problems among the public hospi-tals, and hence the key to the public hospital reform.The mechanism is comprised by three components including the pressure mechanism to create the revenue, the enlargement mechanism to reimburse costs, and the linkage mecha-nism between employee income and hospital surplus.Therefore, a comprehensive policy package should be adopted to undertake these three aspects among which the linkage mechanism is the crucial one.

  2. 重庆市建立公共文化服务体系协调组工作的重难点%Key Points and Difficulties in Establishing Chongqing Public Cultural Service System Coordinating Group

    Institute of Scientific and Technical Information of China (English)

    彭泽明

    2014-01-01

    In order to differentiate Chongqing Public Cultural Service System Coordinating Group ( hereafter referred to as Coordinating Group) from formerly-established steering groups and bureau-level joint conferences, prompt leading departments to actually exercise their functions and perform their duties, as well as motivate relevant departments to make concerted efforts and cooperate close-ly, this paper explores the key points and difficulties in establishing the Coordinating Group such as working principles, risk aversion, main content and working procedures in order to provide refer-ences for the establishment of a harmonious, efficient, authoritative and sustaining public cultural service system in Chongqing.%为了使重庆市公共文化服务体系协调组有别于以往建立的领导小组和局际联席会议,使牵头部门切实发挥作用、履行职责,相关部门齐心协力、深度融合,本文从学理上对公共文化服务体系协调组建立的工作原则、风险规避、主要内容、工作流程四个重点、难点问题进行了初步探究,试图为重庆市建立和谐、高效、权威、持续的公共文化服务体系协调组提供借鉴和参考。

  3. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  4. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  5. Certificateless Multi-receiver Signcryption Scheme Based on Multivariate Public Key Cryptography%基于多变量公钥密码体制的无证书多接收者签密体制

    Institute of Scientific and Technical Information of China (English)

    李慧贤; 陈绪宝; 庞辽军; 王育民

    2012-01-01

    针对基于身份的多接收者签密方案不能抵抗量子攻击以及存在的密钥托管问题,基于多变量公钥密码体制,提出一个多接收者模型下的无证书签密方案.新方案不仅避免了基于身份密码体制的密钥托管问题,而且继承了多变量公钥密码体制的优势,实现了“抗量子攻击”的高安全性.与现有方案相比,新方案无需双线性对操作,具有更少的计算量,更高的计算效率,适用于智能卡等计算能力较小的终端设备.最后,在随机预言模型下,给出了该文方案基于MQ困难问题假设和IP困难问题假设的安全性证明.分析表明,该文方案具有不可否认性、前向安全性、后向安全性、保护接收者隐私等安全属性.%Aiming at the vulnerability under quantum attacks and the inherent key escrow problem of the existing ID-based multi-receiver signcryption schemes, we propose an efficient certificateless multi-receiver signcryption scheme (CLMSC), which is based on the multivariate public key cryptography (MPKC). The new scheme can not only avoid the inherent key escrow problem in the identity-based cryptographic system,but also have the advantage of MPKC, that is, it can withstand the quantum attack. The proposed scheme does not require any pairing operations in signcrypting a message for any number of receivers. Therefore, compared with the existing signcryption schemes, the proposed scheme is more efficient, and thus it is suitable for terminals which have lower computation capacity like smart card. Finally, we prove its semantic security under the hardness of Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model respectively. The proposed scheme also has the security properties of non-repudiation, forward security, backward security and the recipient privacy protection.

  6. 基于多变量公钥密码体制的代理重签名方案%Proxy Re-signature Scheme Based on Multivariate Public Key Cryptography

    Institute of Scientific and Technical Information of China (English)

    孙昌毅; 李益发; 斯雪明

    2012-01-01

    Almost proxy re-signature schemes are hardness of big integer factoring problem and Discrete Logarithm(DL) problem. But the quantum computer can solve this question in polynomial time, which may cause potential security risks to the schemes. This paper uses the characteristics that multivariate public key cryptography can resist quantum computer attack, to design a new proxy re-signature scheme. Theoretical analysis shows that the scheme fits internal and external security, and it is efficient.%代理重签名方案大多是基于大数分解和离散对数难题设计的,而量子计算机能在多项式时间内求解这些难题,从而给方案造成安全隐患.为此,利用多变量公钥密码体制可以抵抗量子攻击的特性,设计一个新的代理重签名方案.理论分析结果表明,该方案满足内部安全性和外部安全性,且运算效率高.

  7. 可撤销的无需安全信道带关键字搜索公钥加密方案%Revocable Secure Channel Free Public Key Encryption with Keyword Search

    Institute of Scientific and Technical Information of China (English)

    于瑞琴

    2011-01-01

    通常的密码系统IBE或者PKI都必须提供从系统中撤销用户私钥的途径,同样PEKS也应该提供撤销陷门的方式. 笔者构造了1个可高效撤销的无需安全信道带关键字搜索公钥加密方案. 在该方案中,实际更新的数量仅为关键字陷门数量的对数级,这使得它非常实用.%Any setting,PKI- or identity-based,must provide a means to revoke users from the system. Efficient revocation is a well-studied problem in the traditional PKI or identity-based setting. This paper proposes revocable secure channel free public key encryption with keyword search scheme. In the scheme,the actually updated-keywords number is only the logarithm of the number of users, which makes it very practical.

  8. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  9. Research and realization of SM2 elliptic curve public key encryption algorithm%SM2椭圆曲线公钥加密算法的研究与实现

    Institute of Scientific and Technical Information of China (English)

    李玉生

    2016-01-01

    随着互联网的发展,越来越多的信息交换通过网络进行,在这些信息中包含着不能为人所知的私密信息,例如,信用卡账号、银行账号、病历、电子邮件等。由于私密信息泄露产生不良后果的事件时有发生,这些都牵扯到对数据信息的加密问题。针对这一问题,文章提出运用SM2加密算法实现数据信息的加密,保证网络通信的安全性。事实表明,SM2公钥加密算法能够更加安全地加密数据信息,且加密的数据很难破译。%With the development of the Internet, more and more information is exchanged through the network, among those information, there are some private information that can not be known by others, for example, credit card accounts, bank accounts, medical record, e-mail, etc. Bad consequences caused by private information leakage occurred frequently, which is involved in the encryption of data information. In view of this problem, this paper proposes the use of SM2 encryption algorithm to achieve data encryption and ensure the security of network communication. Facts show that the SM2 public key encryption algorithm can encrypt data more safely, and the encryption data is dififcult to decipher.

  10. Secret Key Generation From Mobility

    CERN Document Server

    Gungor, Onur; Koksal, C Emre

    2011-01-01

    We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.

  11. Key Revocation System for DNSSEC

    Directory of Open Access Journals (Sweden)

    Gilles Guette

    2008-06-01

    Full Text Available The Doma in Name System (DNS is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions (DNSSEC has been designed to protect the DNS protocol using public key cryptography and digital signatures. In this paper, we show how DNSSEC can be attacked using compromised keys and the consequences of such attacks. Then, we propose a new revocation scheme for DNSSEC based on two new resource records. There is currently no revocation system defined in the DNSSEC standard.

  12. Publicity and public relations

    Science.gov (United States)

    Fosha, Charles E.

    1990-01-01

    This paper addresses approaches to using publicity and public relations to meet the goals of the NASA Space Grant College. Methods universities and colleges can use to publicize space activities are presented.

  13. RFID Key Establishment Against Active Adversaries

    CERN Document Server

    Bringer, Julien; Cohen, Gérard; Kindarji, Bruno

    2010-01-01

    We present a method to strengthen a very low cost solution for key agreement with a RFID device. Starting from a work which exploits the inherent noise on the communication link to establish a key by public discussion, we show how to protect this agreement against active adversaries. For that purpose, we unravel integrity $(I)$-codes suggested by Cagalj et al. No preliminary key distribution is required.

  14. New Security Results on Encrypted Key Exchange

    OpenAIRE

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2003-01-01

    Schemes for encrypted key exchange are designed to provide two entities communicating over a public network, and sharing a (short) password only, with a session key to be used to achieve data integrity and/or message confidentiality. An example of a very efficient and "elegant" scheme for encrypted key exchange considered for standardization by the IEEE P1363 Standard working group is AuthA. This scheme was conjectured secure when the symmetric-encryption primitive is instantiated via e...

  15. Quantum asymmetric cryptography with symmetric keys

    Science.gov (United States)

    Gao, Fei; Wen, Qiaoyan; Qin, Sujuan; Zhu, Fuchen

    2009-12-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstrated.

  16. Quantum asymmetric cryptography with symmetric keys

    OpenAIRE

    Gao, Fei; Wen, Qiao-Yan; Qin, Su-Juan; Zhu, Fu-Chen

    2008-01-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstr...

  17. Quantum asymmetric cryptography with symmetric keys

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Based on quantum encryption,we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme,which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore,the state-estimation attack to a prior QPKC scheme is demonstrated.

  18. Quantum asymmetric cryptography with symmetric keys

    Institute of Scientific and Technical Information of China (English)

    GAO Fei; WEN QiaoYan; QIN SuJuan; ZHU FuChen

    2009-01-01

    Based on quantum encryption, we present a new idea for quantum public-key cryptography (QPKC) and construct a whole theoretical framework of a QPKC system. We show that the quantum-mechanical nature renders it feasible and reasonable to use symmetric keys in such a scheme, which is quite different from that in conventional public-key cryptography. The security of our scheme is analyzed and some features are discussed. Furthermore, the state-estimation attack to a prior QPKC scheme is demonstrated.

  19. Quantum Key Distribution

    Science.gov (United States)

    Seshu, Ch.

    Quantum Key Distribution (QKD) uses Quantum Mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.

  20. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  1. Quantum dense key distribution

    CERN Document Server

    Degiovanni, I P; Castelletto, S; Rastello, M L; Bovino, F A; Colla, A M; Castagnoli, G C

    2004-01-01

    This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  2. Key Issues and Policy Considerations in Promoting Lifelong Learning in Selected African Countries: Ethiopia, Kenya, Namibia, Rwanda and Tanzania. UIL Publication Series on Lifelong Learning Policies and Strategies. No. 1

    Science.gov (United States)

    Walters, Shirley; Yang, Jim; Roslander, Peter

    2014-01-01

    This cross-national study focuses on key issues and policy considerations in promoting lifelong learning in Ethiopia, Kenya, Namibia, Rwanda, and Tanzania (the five African countries that took part in a pilot workshop on "Developing Capacity for Establishing Lifelong Learning Systems in UNESCO Member States: at the UNESCO Institute for…

  3. 手机出版内容提供商的构成及关键问题分析%The Constituent and Key Problems of the Providers of Publication by Mobile Phone

    Institute of Scientific and Technical Information of China (English)

    闫花菊

    2011-01-01

    手机出版的内容决定了手机出版的未来。在拥有良好的用户群基础和稳定的运营商支持的中国手机出版领域,对现有的网络媒介、传统媒介及图书馆、原创作者个人、学校内部组织等手机出版内容提供者现状及存在问题的探讨和分析,有助于加强我们对手机出版发展重要意义的认知。%The future of publication by mobile phone depends on the content. The field of publication by mobile phone has a good users' foundation and a stable operators' support. Comparative analysis of the existing content providers of publication by mobile phone, including network media, traditional media, libraries, the internal organization of the university and the original authors, will be meaningful for the future of the publication by mobile phone.

  4. A Research of Algorithm about Public Opinion Key words Filtering Based on Search Engine%基于搜索引擎的关键词舆情过滤算法研究

    Institute of Scientific and Technical Information of China (English)

    冯如晓; 刘志明; 雷龙艳

    2014-01-01

    网络舆情已成为社会情报的一种重要表现形式。对于性质恶劣(负面)的网络舆情信息,能否及时高效的挖掘出来对网络舆情监控具有十分重要的意义。针对目前舆情发现的时效性不足的问题,该文提出基于搜索引擎的关键词检索过滤算法,并在多线程环境下运行,充分利用索引查询的高效性,大大提高了恶劣舆情过滤的效率。%Net-mediated public opinion has become one format of social information. As to severe public opinion context, it is of significance for public opinion monitoring system to find that information timely and efficient. To deal with the problem of lacking efficiency of finding severe opinion at present, in this paper, a algorithm about keywords filtering based on search engine is designed and run in multi-thread environment. The algorithm makes use of index searching efficiency and improves productiv-ity obviously in public opinion filtering system.

  5. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  6. Mechanism Innovation:The Key to the Breakthrough of Talent Construction of Public Cultural Services for Huangshi City%机制创新:黄石公共文化服务人才建设突破的关键

    Institute of Scientific and Technical Information of China (English)

    吴秀平; 刘小畅

    2016-01-01

    黄石市公共文化服务体系建设经过多年的发展,取得了一些成就,但仍存在专业人才匮乏、人员老化严重、乡镇文化站功能弱化及高层次人才难引进等问题。黄石市应推进人事制度改革,加强从业人员的准入等相关的制度建设;加强基层公共文化服务人员培训的长效机制;加强公共文化服务人才的本土化;加大拔尖人才引进的力度;充分利用和整合黄石地区高校文化资源的优势,以此推动黄石地区公共文化服务人才建设的全面、快速发展。%Huangshi has made some achievements in the public cultural service system construction .However there are still some problems such as the shortage of professionals , the aging problem of professionals , the weakening of the function of the township culture service centers and the difficulty in recruiting high level tal-ent in the villages and towns in the construction of public cultural services .To strength the construction of public cultural services talents ,the following measures can be taken: advancing the reform of personnel sys-tem,strengthening the staff and other related system construction ,strengthening long -term training of public cultural service personnel at the grass -roots level,strengthening localization of public cultural services per-sonnel and recruiting more high level talents and making full use of the cultural resources in universities in Huangshi.

  7. Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution

    Directory of Open Access Journals (Sweden)

    Abudhahir Buhari

    2012-10-01

    Full Text Available We propose a multi-party quantum key distribution protocol which enables all the receivers can converttheir respective private shared key into common secret key without use of entanglement. The maincomponent of our protocol is a simple post quantum scheme for achieving the higher secret key rate.Efficiency of the extracted key rate is almost 100%. We assume that sender established the pre-sharedprivate secret keys and a common secret number with the receivers. Our proposed scheme sends n stringsof number to n receivers in the public channel to convert their respective shared secret key into commonsecret key in the presence of Eve. We also analyze the complexity of attack by the adversary to guess thesecret key

  8. On the Four Key Problems to Evaluate the Medical Ethics for Public Health Communication%论大众健康传播医学伦理评价的四个关键问题

    Institute of Scientific and Technical Information of China (English)

    王勇安; 张建耕; 吴洁

    2011-01-01

    Based on the analysis of the properties of the health spread, the author suggested that the public health communication activity should be evaluated because the public health communication activity is either communication activity or the health care activities, and both either comply with communication ethics or more cant go against medical ethics. The medical ethics experts should be the main body of the professional evaluation core team - as a spokesman of the social public - to make the value decide and moral decisions for the motivation and the results of public health communication activity according to four principle or the standard of medical ethics: no hurt, favorable, respect and justice.%在分析健康传播属性的基础上,认为大众健康传播活动既是传播活动,也是医疗保健活动,既要符合传播伦理,更不能违背医学伦理规范,必须进行医学伦理评价.应当由以医学伦理学专家为核心的专业评价队伍作为评价主体——社会公众的代言人,以不伤害、有利、尊重和公正四大医学伦理学原则为标准,对大众健康传播活动的动机和结果进行价值确定和道德决断.

  9. Public Education, Public Good.

    Science.gov (United States)

    Tomlinson, John

    1986-01-01

    Criticizes policies which would damage or destroy a public education system. Examines the relationship between government-provided education and democracy. Concludes that privatization of public education would emphasize self-interest and selfishness, further jeopardizing the altruism and civic mindedness necessary for the public good. (JDH)

  10. The Homomorphic Key Agreement

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.

  11. Key Account Management

    OpenAIRE

    Dvořák, Dalibor

    2007-01-01

    This note tries to explain concept of key account management (KAM), factors leading to importance of this emerging concept, criteria to determine key accounts from customer base, benefits to both buyers and sellers agreeing to practice it, stages of KAM relationship, conditions under which power lies with buyer or seller, outlines risks faced by both the parties, key success factors, challenges faced in implementing this concept and relevance to infrastructure sector.

  12. Public relations effectiveness in public health institutions.

    Science.gov (United States)

    Springston, Jeffrey K; Weaver Lariscy, Ruth Ann

    2005-01-01

    This article explores public relations effectiveness in public health institutions. First, the two major elements that comprise public relations effectiveness are discussed: reputation management and stakeholder relations. The factors that define effective reputation management are examined, as are the roles of issues and crisis management in building and maintaining reputation. The article also examines the major facets of stakeholder relations, including an inventory of stakeholder linkages and key audiences, such as the media. Finally, methods of evaluating public relations effectiveness at both the program level and the institutional level are explored.

  13. Financial Key Ratios

    Directory of Open Access Journals (Sweden)

    Tănase Alin-Eliodor

    2014-08-01

    Full Text Available This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  14. The compact key

    NARCIS (Netherlands)

    NN,

    1966-01-01

    Here is given a sample of a new sort of identification key, recently developed by Dr. P. W. Leenhouts of the Rijksherbarium. Having to sort many specimens of Sapindaceae into genera, he became dissatisfied with the common dichotomous key, which too often does not work when the material is not comple

  15. The Key of Public Sports Resources Allocation:Effective Market and Promising Government%有效的市场与有为的政府:公共体育资源优化配置的关键

    Institute of Scientific and Technical Information of China (English)

    舒宗礼

    2015-01-01

    文章采用文献资料法、实地调查法和访谈法从阐释公共体育资源的二重属性着手,对公共体育资源配置中政府与市场的协同调控机制及其作用进行了探讨。认为:(1)公共体育资源的公共属性和经济属性决定了公共体育资源可以采用计划配置与市场配置两种配置方式,协调好政府与市场的关系是公共体育资源优化配置的核心问题;(2)政府与市场之间是相互补充、相互协调、相互促进、有机统一的关系,“政府失灵”与“市场失灵”的现实共存,需要政府与市场(企业、社会组织、公民)之间建立起多元化协同调控机制;(3)政府的优势在于规划,通过参与、引导、监管、调节来发挥主导作用;市场的优势在于生产,通过供求机制、价格机制、竞争机制来发挥决定性作用;(4)只有“有效的市场”和“有为的政府”的协同治理,防止政府市场关系失位,才能实现公共体育资源的优化配置。%Using the methods of literature review, field survey and interview, and taking an interpretation of dual properties of public sports resources as its basis, discusses the government - market coordinated regulatory mechanism of public sports resources allocation and its effect The results show that:(1) the allocation of public sports resources is determined by their attributes, namely, the public attribute and the economic attribute. The allocation can be realized through government plans and market operations. The core problem is to harmonize the relationship between government and market;(2) the relationship between government and market mutually supplementary, coordinated, promotional and unified,“government failure" and"market failure" coexist in re-ality. Therefore, a diversified coordinated regulatory mechanism between government and market( enterprises, social organizations and citizens) needs to be developed;(3) Government's advantage

  16. Public Speech.

    Science.gov (United States)

    Green, Thomas F.

    1994-01-01

    Discusses the importance of public speech in society, noting the power of public speech to create a world and a public. The paper offers a theory of public speech, identifies types of public speech, and types of public speech fallacies. Two ways of speaking of the public and of public life are distinguished. (SM)

  17. Public health, public trust and lobbying.

    Science.gov (United States)

    Wynia, Matthew K

    2007-06-01

    Each year, infection with Human Papillomavirus (HPV) leads to millions of abnormal Pap smears and thousands of cases of cervical cancer in the US. Throughout the developing world, where Pap smears are less common, HPV is a leading cause of cancer death among women. So when the international pharmaceutical giant Merck developed a vaccine that could prevent infection with several key strains of HPV, the public health community was anxious to celebrate a major advance. But then marketing and lobbying got in the way. Merck chose to pursue an aggressive lobbying campaign, trying to make its new vaccine mandatory for young girls. The campaign stoked public mistrust about how vaccines come to be mandated, and now it's not just Merck's public image that has taken a hit. The public health community has also been affected. What is the lesson to be learned from this story? Public health communication relies on public trust.

  18. An Alternative to Keys

    Science.gov (United States)

    O'Hagan, James

    1977-01-01

    For the secondary school, the author discourages the use of dichotomous keys in favor of a punch-card system. The system is readily constructed by students for use in plant and animal classification. (CP)

  19. Keys to the City

    DEFF Research Database (Denmark)

    Monsson, Christian Kjær

    2014-01-01

    Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118......Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118...

  20. Key concepts in energy

    CERN Document Server

    Madureira, Nuno Luis

    2014-01-01

    Highlights how key energy concepts surfaced, tracing their evolution throughout history to encompasses four economic concepts and four technological-engineering concepts developed through their history to conclude with current economic and environmental sciences Considers the process of energy-substitutions through complementary usages, hybridization and technological mixes Combines a conceptual approach with key theoretical concepts from engineering, geological and economic sciences providing cross disciplinary overview of energy fundamentals in a short and focused reading

  1. Secret Key Crypto Implementations

    Science.gov (United States)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  2. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Subhash Kak

    2000-05-01

    This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum method of Bennett and Brassard (BB84) where the transmission states have been decreased from 4 to 3 and the detector states have been increased from 2 to 3. Under certain assumptions regarding method of attack, it provides superior performance (in terms of the number of usable key bits) for < 18, where is the number of key bits used to verify the integrity of the process in the BB84-protocol.

  3. About the Key Escrow Properties of Identity Based Encryption Schemes

    Directory of Open Access Journals (Sweden)

    Ruxandra Olimid

    2012-09-01

    Full Text Available IBE (Identity Based Encryption represents a type of public key encryption that allows a party to encrypt a message using the recipient’s identity as public key. The private keys needed for decryption are generated and distributed to each party by a KGC (Key Generation Center. The existence of such an entity in an IBE scheme allows access to the encrypted information for other parties other than the intended recipient by construction: the KGC or any other entity that receives the cryptographic keys from the KGC may perform decryption. A system that permits other parties to have access to the private keys of the users is said to have key escrow abilities. The paper performs a brief analysis of the key escrow properties of IBE schemes and gives a practical example of communication protocol that improves the key escrow capabilities.

  4. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  5. Keys through ARQ

    CERN Document Server

    Latif, Mohamed Abdel; Gamal, Hesham El

    2009-01-01

    This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses the available opportunistic secrecy gains using only the one bit feedback, in the form of ACK/NACK. The distribution of key bits among multiple ARQ epochs, in our approach, allows for mitigating the secrecy outage phenomenon observed in earlier works. We characterize the information theoretic limits of the proposed scheme, under different assumptions on the channel spatial and temporal correlation function, and develop low complexity explicit implementations. Our analysis reveals a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation, between the legitimate and eavesdropper channels, on the achievable secrecy rates. We further develop an adaptive rate allocation policy which achieves higher secrecy rates by exploiting the channe...

  6. Key Data on Education in Europe 2012

    Science.gov (United States)

    Ranguelov, Stanislav; De Coster, Isabelle; Norani, Sogol; Paolini, Giulia

    2012-01-01

    Key Data on Education in Europe 2012 is a Eurydice flagship publication tracing the main developments of European education systems over the last decade. The report combines statistical data with qualitative information to describe the organisation, management and functioning of 37 European education systems from pre-primary to higher education.…

  7. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  8. Training Public Health Advisors.

    Science.gov (United States)

    Meyer, Pamela A; Brusuelas, Kristin M; Baden, Daniel J; Duncan, Heather L

    2015-01-01

    Federal public health advisors provide guidance and assistance to health departments to improve public health program work. The Centers for Disease Control and Prevention (CDC) prepares them with specialized training in administering public health programs. This article describes the evolving training and is based on internal CDC documents and interviews. The first federal public health advisors worked in health departments to assist with controlling syphilis after World War II. Over time, more CDC prevention programs hired them. To meet emerging needs, 3 major changes occurred: the Public Health Prevention Service, a fellowship program, in 1999; the Public Health Associate Program in 2007; and integration of those programs. Key components of the updated training are competency-based training, field experience, supervision, recruitment and retention, and stakeholder support. The enduring strength of the training has been the experience in a public health agency developing practical skills for program implementation and management.

  9. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  10. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  11. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without infor

  12. Chocolate Key Cryptography

    Science.gov (United States)

    Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H.

    2010-01-01

    Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…

  13. Chocolate Key Cryptography

    Science.gov (United States)

    Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H.

    2010-01-01

    Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…

  14. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  15. Public Values

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Rutgers, Mark R.

    2015-01-01

    administration is approached in terms of processes guided or restricted by public values and as public value creating: public management and public policy-making are both concerned with establishing, following and realizing public values. To study public values a broad perspective is needed. The article suggest......This article provides the introduction to a symposium on contemporary public values research. It is argued that the contribution to this symposium represent a Public Values Perspective, distinct from other specific lines of research that also use public value as a core concept. Public...... a research agenda for this encompasing kind of public values research. Finally the contributions to the symposium are introduced....

  16. Science, Public Engagement with

    DEFF Research Database (Denmark)

    Irwin, Alan

    2015-01-01

    regarding their definition in institutional practice. Science and technology studies scholars have been especially active in challenging prevailing policy assumptions in this area and in considering how science–public relations might be reinterpreted and reconstructed. This article presents some of the key......‘Public engagement with science’ evokes a series of long-standing issues concerning the relationship between members of the public (or citizens) and matters of technical expertise. However, each of the terms ‘public,’ ‘engagement,’ and ‘science’ is open to question, and to empirical investigation...

  17. 公共财政扶贫支出绩效评价研究--基于国家扶贫重点县数据%A Study on Evaluation of the Performance of Public Expenditure on Poverty-alleviating-Based on the Data of National Key Poverty-alleviating Counties

    Institute of Scientific and Technical Information of China (English)

    张铭洪; 施宇; 李星

    2014-01-01

    The paper evaluates empirically the performance of public expenditure on poverty-alleviating with the data of nation-al key poverty-alleviating counties from the year of 2003 to 2010, then sets up the evaluation criteria based on benchmarking method. The study shows that the performance of public expenditure on poverty-alleviating has been improving in recent years, however, the driving effect and expenditure structure of public funds need to be improved urgently. Meanwhile, great efforts should be put on improvement of housing,health and education conditions,and enhancement of the poverty groups’ability to get out of poverty by themselves in poor regions.%文章运用2003-2010年国家扶贫工作重点县数据,实证评价了公共财政扶贫支出绩效,并基于标杆管理思想设置了评价标准。研究发现,近年来公共财政扶贫支出绩效基本呈持续上升趋势,但是在财政资金带动和配置结构方面亟需改进,同时应大力改善贫困地区住房、医疗和教育条件,并提高扶贫对象的自我脱贫能力。

  18. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  19. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  20. Ancel Keys: a tribute.

    Science.gov (United States)

    Vanitallie, Theodore B

    2005-02-14

    Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study - which was immediately recognized to be a classic - continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  1. Batch Private Keys Generation for RSA in Security Communication Systems

    Institute of Scientific and Technical Information of China (English)

    CHEN Yun; CHEN Xin

    2005-01-01

    RSA public key cryptosystem is extensively used in information security systems.However, key generation for RSA cryptosystem requires multiplicative inversion over finite field, which has higher computational complexity, compared with either multiplication in common sense or modular multiplication over finite field. In order to improve the performance of key generation, we propose a batch private keys generation method in this paper. The method derives efficiency from cutting down multiplicative inversions over finite field. Theoretical analysis shows that the speed of batch private keys generation for s users is faster than that of s times solo private key generation. It is suitable for applications in those systems with large amount of users.

  2. Geology and hydrogeology of the Florida Keys

    Science.gov (United States)

    Halley, Robert B.; Vacher, H. L.; Shinn,

    1997-01-01

    This chapter discusses the geology and hydrogeology of the Florida Keys, and focuses on the islands formed of Pleistocene limestone. These islands, which are crossed when driving from Miami to Key West, are typically regarded as "the Florida Keys." The outstanding and fragile character of ecosystems on and around the Florida Keys has prompted State and Federal efforts to protect and preserve the remaining public portions of the region. The Florida Keys were largely ignored during the sixteenth, seventeenth, and eighteenth centuries, although the waters just offshore provided a major shipping thoroughfare to and from the New World. The Florida Keys are now recognized as one of the great recreational and environmental resources of the United States. The islands are outposts of a laid-back, tropical resort culture that has as its foundation warmth and clear water. A significant part of the attraction is fishing, diving, and boating around the area's coral reefs, which the islands protect. But the reefs were not always so highly valued. The Florida Keys that have protected the reefs for millennia, may now be the source of the agents that may accomplish what Agassiz thought was beyond man's power a century ago.

  3. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Establishment of a Method for Content Determination of Polysaccharide in Membranous milkveteh root Applied in Fisheries Yu Xiao-qing et al. (1) Abstract Some chemical component in the traditional Chinese medicine Membranous milkvetch root can improve the ability of disease-prevention of animal and it can be applied in fisheries. In the paper, the method about content determination of polysaccharide in the root was established based on orthogonal experimental design Key words medicine; polysaccharide in Membranous milkvetch root; method of determination

  4. Ancel Keys: a tribute

    OpenAIRE

    VanItallie Theodore B

    2005-01-01

    Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recogni...

  5. Identification key to Quivira milkweeds

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a key to milkweed identification at Quivira National Wildlife Refuge. It contains a dichotomous key as well as a picture key. Milkweeds found on the...

  6. A typology of public engagement mechanisms

    NARCIS (Netherlands)

    Rowe, G.; Frewer, L.J.

    2005-01-01

    Imprecise definition of key terms in the "public participation" domain have hindered the conduct of good research and militated against the development and implementation of effective participation practices. In this article, we define key concepts in the domain: public communication, public consult

  7. Error-correcting pairs for a public-key cryptosystem

    CERN Document Server

    Márquez-Corbella, Irene

    2012-01-01

    Code-based cryptography is an interesting alternative to classic number-theory PKC since it is conjectured to be secure against quantum computer attacks. Many families of codes have been proposed for these cryptosystems, one of the main requirements is having high performance t-bounded decoding algorithms which in the case of having high an error-correcting pair is achieved. In this article the class of codes with a t-ECP is proposed for the McEliece cryptosystem. The hardness of retrieving the t-ECP for a given code is considered. As a first step distinguishers of several subclasses are given.

  8. Lattice Based Tools in Cryptanalysis for Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    R.Santosh Kumar

    2012-03-01

    Full Text Available Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Latticereduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence of lattice based cryptosystems of hard in nature, but also has vulnerabilities by lattice reduction techniques. In this survey paper, we are focusing on point lattices and then describing an introduction to the theoretical and practical aspects of lattice reduction. Finally, we describe the applications of lattice reduction in Number theory, Linear algebra

  9. Public-key cryptography in functional programming context

    CERN Document Server

    Márton, Gyöngyvér

    2010-01-01

    Up to now, for efficiency reasons cryptographic algorithm has been written in an imperative language. But to get acquaintance with a functional programming language a question arises: functional programming offers some new for secure communication or not? This article investigates this question giving an overview on some cryptography algorithms and presents how the RSA encryption in the functional language Clean can be implemented and how can be measured the efficiency of a certain application.

  10. A model for revocation forecasting in public-key infrastructures

    OpenAIRE

    Hernández Gañan, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Alins Delgado, Juan José

    2015-01-01

    One of the hardest tasks of a certification infrastructure is to manage revocation. This process consists in collecting and making the revocation status of certificates available to users. Research on this topic has focused on the trade-offs that different revocation mechanisms offer. Much less effort has been conducted to understand and model real-world revocation processes. For this reason, in this paper, we present a novel analysis of real-world collected revocation data and we propose a r...

  11. Public-Key Encryption with Non-interactive Opening

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Hofheinz, Dennis; Kiltz, Eike

    2008-01-01

    in cryptographic protocol design, e.g., when the receiver wants to demonstrate that some information he was sent privately was not correctly formed. We give a definition based on the UC framework as well as an equivalent game-based definition. The PKENO concept was informally introduced by Damgård and Thorbek who...

  12. Is Public-Key Encryption Based on LPN Practical?

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Park, Sunoo

    2012-01-01

    We conduct a practically oriented study of the cryptosystem suggested by Alekhnovich based on the Learning Parity with Noise (LPN) problem. We consider several improvements to the scheme, inspired by similar existing variants of Regev's LWE-based cryptosystem. Our conclusion is that LPN-based pub...

  13. Security Issues of the Digital Certificates within Public Key Infrastructures

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance, a research paper has mentioned how a PKI security may be violated by MD5 collision over information from the certificates. In order to develop further studies on the topic a serious knowledge about certificate structure is necessary.

  14. 76 FR 48807 - Public Key Infrastructure (PKI) Certificate Action Form

    Science.gov (United States)

    2011-08-09

    ...) technology to support electronic commerce between the USPTO and its customers. PKI is a set of hardware... its electronic commerce systems, the USPTO uses PKI technology to protect the integrity...

  15. Public lighting.

    NARCIS (Netherlands)

    Schreuder, D.A.

    1986-01-01

    The function of public lighting and the relationship between public lighting and accidents are considered briefly as aspects of effective countermeasures. Research needs and recent developments in installation and operational described. Public lighting is an efficient accident countermeasure, but

  16. Paediatric pharmacokinetics: key considerations

    Science.gov (United States)

    Batchelor, Hannah Katharine; Marriott, John Francis

    2015-01-01

    A number of anatomical and physiological factors determine the pharmacokinetic profile of a drug. Differences in physiology in paediatric populations compared with adults can influence the concentration of drug within the plasma or tissue. Healthcare professionals need to be aware of anatomical and physiological changes that affect pharmacokinetic profiles of drugs to understand consequences of dose adjustments in infants and children. Pharmacokinetic clinical trials in children are complicated owing to the limitations on blood sample volumes and perception of pain in children resulting from blood sampling. There are alternative sampling techniques that can minimize the invasive nature of such trials. Population based models can also limit the sampling required from each individual by increasing the overall sample size to generate robust pharmacokinetic data. This review details key considerations in the design and development of paediatric pharmacokinetic clinical trials. PMID:25855821

  17. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Determination of the Estrogen Alkylphenols and Bisphenol A in Marine Sediments by Gas Chromatography-Mass Spectrometry Deng Xu-xiu et al. (1) Abstract Octylphenol, nonylphenol and bisphenol A are recognized environmental endocrine disruptors. A quantitative method was established for the simultaneous determination of octylphenol, nonylphenol and bisphenol A in marine sediments by gas chromatography-mass spectrometry. The test sample was extracted by methanol with ultrasonic technique, purified with copper powder and carbon solid phase extraction column, and derived with heptafluorobutyric anhydride. Then the analytes were separated on HP-5ms column and determined by gas chromatography-mass. The recovery of the method was between 84.3% and 94.5%, and the LOQ of 4-N- octylphenol, nonylphenol and bisphenol A was 0.25 g/kg, 0.15 g/kg and 0.15 g/kg. Key words octylphenol; nonylphenol; bisphenol A; gas chromatography-mass spectrometry

  18. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  19. Creativity Management Key Elements

    Directory of Open Access Journals (Sweden)

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  20. Identification of Key Barriers in Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the identification of key barriers in the development of an adequate national security workforce as part of the National Security Preparedness Project, being performed under a Department of Energy/National Nuclear Security Administration grant. Many barriers exist that prevent the development of an adequate number of propertly trained national security personnel. Some barriers can be eliminated in a short-term manner, whereas others will involve a long-term strategy that takes into account public policy.

  1. Implementing public employment policy

    DEFF Research Database (Denmark)

    Larsen, Flemming; Bredgaard, Thomas

    disciplining of the unemployed (work first) (cf.Bredgaard & Larsen, 2005; Sol & Westerweld, 2005). It is, however, remarkable that in the research field there seems to be a division of labour so that changes in public administration and changes in the substance of employment policies are dealt with separately...... an intended policy shift, there seems to be very little public discussion about them. Far-reaching policy changes become politically invisible and de-politicized. Our empirical case is the contracting out of the public employment services in Australia, the Netherlands and Denmark. The main question is what...... happens to public employment policies when they are contracted out to various non-public (for-profit and non-profit) agencies. The data consist of in-depth interviews with key respondents in the three countries, observations at service delivery agencies, and desk studies of existing research....

  2. COMMENSURABLE ENCRYPTION USING USER- DEFINE KEY TECHNIQUE

    Directory of Open Access Journals (Sweden)

    ripal dilipbhai ranpara

    2012-11-01

    Full Text Available Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world’s biggest public network, the Internet. Many Internet applications such as e-mail, databases, and browsers store a tremendous amount of personal and financial information, but frequently the data is left unprotected. Traditional network security is frequently less effective at preventing hackers from accessing this data. For instance, once-private databases are now completely exposed on the Internet. It turns out that getting to the database that holds millions of credit card numbers—the transmission—is secure through the use of cryptography, but the database itself isn’t, fueling the rise of credit card information theft. A paradigm shift is now under way for cryptography. The only way to make data secure in any application that runs over the Internet is to use secret (also known as private key cryptography. The current security methods focus on securing Internet applications using public keys techniques that are no longer effective.so according to my knowledge no one has addressed on COMMENSURABLE USER-DEFINE KEY TECHNIQUE that is used to encrypt the data as per the user-define key

  3. Nanofluids research: key issues.

    Science.gov (United States)

    Wang, Liqiu; Fan, Jing

    2010-05-22

    Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets) in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities). Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  4. Nanofluids Research: Key Issues

    Directory of Open Access Journals (Sweden)

    Wang Liqiu

    2010-01-01

    Full Text Available Abstract Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities. Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  5. Public Policy Agenda, 2009

    Science.gov (United States)

    American Association of State Colleges and Universities, 2009

    2009-01-01

    The 2009 Public Policy Agenda summarizes the American Association of State Colleges and Universities' (AASCU's) principles and priorities in key areas of higher education policy. The document is intended to serve as a point of reference for the association's members and other interested organizations as well as federal and state policymakers.…

  6. Public Policy Agenda, 2007

    Science.gov (United States)

    American Association of State Colleges and Universities, 2007

    2007-01-01

    The 2007 Public Policy Agenda summarizes the American Association of State Colleges and Universities' (AASCU's) principles and priorities in key areas of higher education policy. The document is intended to serve as a point of reference for federal and state policymakers, the association's members, and other interested organizations and…

  7. Public Policy Agenda, 2010

    Science.gov (United States)

    American Association of State Colleges and Universities, 2010

    2010-01-01

    The 2010 Public Policy Agenda summarizes the American Association of State Colleges and Universities' (AASCU's) principles and priorities in key areas of higher education policy. This paper is intended to serve as a point of reference for the association's members and other interested organizations, as well as federal and state policymakers.…

  8. Public Policy Agenda, 2008

    Science.gov (United States)

    American Association of State Colleges and Universities, 2008

    2008-01-01

    The 2008 Public Policy Agenda summarizes the American Association of State Colleges and Universities' (AASCU's) principles and priorities in key areas of higher education policy. The document is intended to serve as a point of reference for federal and state policymakers, the association's members, and other interested organizations and…

  9. Public Policy Agenda, 2010

    Science.gov (United States)

    American Association of State Colleges and Universities, 2010

    2010-01-01

    The 2010 Public Policy Agenda summarizes the American Association of State Colleges and Universities' (AASCU's) principles and priorities in key areas of higher education policy. This paper is intended to serve as a point of reference for the association's members and other interested organizations, as well as federal and state policymakers.…

  10. Public Policy Agenda, 2007

    Science.gov (United States)

    American Association of State Colleges and Universities, 2007

    2007-01-01

    The 2007 Public Policy Agenda summarizes the American Association of State Colleges and Universities' (AASCU's) principles and priorities in key areas of higher education policy. The document is intended to serve as a point of reference for federal and state policymakers, the association's members, and other interested organizations and…

  11. Public Policy Agenda, 2009

    Science.gov (United States)

    American Association of State Colleges and Universities, 2009

    2009-01-01

    The 2009 Public Policy Agenda summarizes the American Association of State Colleges and Universities' (AASCU's) principles and priorities in key areas of higher education policy. The document is intended to serve as a point of reference for the association's members and other interested organizations as well as federal and state policymakers.…

  12. Public Policy Agenda, 2008

    Science.gov (United States)

    American Association of State Colleges and Universities, 2008

    2008-01-01

    The 2008 Public Policy Agenda summarizes the American Association of State Colleges and Universities' (AASCU's) principles and priorities in key areas of higher education policy. The document is intended to serve as a point of reference for federal and state policymakers, the association's members, and other interested organizations and…

  13. Public Broadcasting.

    Science.gov (United States)

    Shooshan, Harry M.; Arnheim, Louise

    This paper, the second in a series exploring future options for public policy in the communications and information arenas, examines some of the issues underlying public broadcasting, primarily public television. It advances two reasons why quality local public television programming is scarce: funds for the original production of programming have…

  14. Password Authenticated Key Exchange and Protected Password Change Protocols

    Directory of Open Access Journals (Sweden)

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  15. Implications of Key Performance Indicator Issues in Ontario Universities Explored

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    Since 1998, the Ministry of Training, Colleges and Universities in Ontario, Canada, has required that data on specific key performance indicators (KPIs) be made public by its publicly funded universities. The information is intended to be used by universities to demonstrate their achievements, to improve their programmes and services, and to…

  16. Key Updating Methods for Combinatorial Design Based Key Management Schemes

    Directory of Open Access Journals (Sweden)

    Chonghuan Xu

    2014-01-01

    Full Text Available Wireless sensor network (WSN has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.

  17. Discrete Event Simulation Modeling and Analysis of Key Leader Engagements

    Science.gov (United States)

    2012-06-01

    SIMULATION MODELING AND ANALYSIS OF KEY LEADER ENGAGEMENTS by Clifford C. Wakeman June 2012 Thesis Co-Advisors: Arnold H. Buss Susan...DATE June 2012 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Discrete Event Simulation Modeling and Analysis of Key...for public release; distribution is unlimited DISCRETE EVENT SIMULATION MODELING AND ANALYSIS OF KEY LEADER ENGAGEMENTS Clifford C. Wakeman

  18. URBAN POLITICS: KEY APPROACHES

    Directory of Open Access Journals (Sweden)

    Ledyaeva Ol'ga Mikhaylovna

    2012-10-01

    Full Text Available Several approaches that underlie urban politics are discussed in the paper. They include neo-liberalism, political economy discourse, elitist/pluralist debates, and postmodernism. The neoliberal approach focuses on the limited role of the state and individual responsibility. The legal framework protects both the rights and responsibilities of individuals and regulates the operation of the market. It is the market that fosters individual choices and provides goods and services by virtue of the processes which are flexible, efficient and transparent. The political economy approaches (regulation theory, public choice theory, neo-Marxism explain urban politics via the analysis of national and international economic processes and changes in contemporary capitalism. Changes in national and international economies determine what solutions are possible. The discourse has been influenced by the debate on globalization of capital and labour markets. Modern elitism and neopluralism are represented by theories of "growth machines" and "urban regimes". The former focuses on bargaining alliances between political and business leaders in order to manage the urban system and to promote its growth. The latter develops neopluralist explanations of power within local communities with an emphasis on the fragmented nature of the government where local authorities lack comprehensive governing powers. Postmodernism views the city as the site of the crisis of late capitalism which leads to segregation of neighbourhoods onto prosperous areas and ghettoes. In contrast to the modern city, the postmodern city is not defined by its industrial base; rather, it is determined by its consumerist environment of malls and museums, characterized by revivalist architecture. At the same time, the suburban shopping mall and a motorway network make nonsense of the idea of the city as a unique and well-defined space. These and other approaches encompass a wide spectrum of possibilities

  19. Sets, Subsets, and Dichotomous Keys

    Science.gov (United States)

    Cole, E. James

    1973-01-01

    Discusses the procedures that should be observed in constructing a dichotomous key. The keying exercise described was used as a laboratory activity in a biology course for elementary education majors, however it could be used in other courses. (JR)

  20. Key Concepts in Informatics: Algorithm

    Science.gov (United States)

    Szlávi, Péter; Zsakó, László

    2014-01-01

    "The system of key concepts contains the most important key concepts related to the development tasks of knowledge areas and their vertical hierarchy as well as the links of basic key concepts of different knowledge areas." (Vass 2011) One of the most important of these concepts is the algorithm. In everyday life, when learning or…

  1. New Public Management and Education

    Science.gov (United States)

    Tolofari, Sowaribi

    2005-01-01

    Public administration has always been under constant review. Such reviews were mostly parochial, incremental, initiated or driven by low-key staff and often ended as fads. From the end of the 1970s to the 1990s, however, governments around the world were engaged in widespread and sustained reforms of their public administration. These reforms were…

  2. Public health workforce taxonomy.

    Science.gov (United States)

    Boulton, Matthew L; Beck, Angela J; Coronado, Fátima; Merrill, Jacqueline A; Friedman, Charles P; Stamas, George D; Tyus, Nadra; Sellers, Katie; Moore, Jean; Tilson, Hugh H; Leep, Carolyn J

    2014-11-01

    Thoroughly characterizing and continuously monitoring the public health workforce is necessary for ensuring capacity to deliver public health services. A prerequisite for this is to develop a standardized methodology for classifying public health workers, permitting valid comparisons across agencies and over time, which does not exist for the public health workforce. An expert working group, all of whom are authors on this paper, was convened during 2012-2014 to develop a public health workforce taxonomy. The purpose of the taxonomy is to facilitate the systematic characterization of all public health workers while delineating a set of minimum data elements to be used in workforce surveys. The taxonomy will improve the comparability across surveys, assist with estimating duplicate counting of workers, provide a framework for describing the size and composition of the workforce, and address other challenges to workforce enumeration. The taxonomy consists of 12 axes, with each axis describing a key characteristic of public health workers. Within each axis are multiple categories, and sometimes subcategories, that further define that worker characteristic. The workforce taxonomy axes are occupation, workplace setting, employer, education, licensure, certification, job tasks, program area, public health specialization area, funding source, condition of employment, and demographics. The taxonomy is not intended to serve as a replacement for occupational classifications but rather is a tool for systematically categorizing worker characteristics. The taxonomy will continue to evolve as organizations implement it and recommend ways to improve this tool for more accurate workforce data collection.

  3. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  4. Public Schools

    Data.gov (United States)

    Department of Homeland Security — This Public Schools feature dataset is composed of all Public elementary and secondary education in the United States as defined by the Common Core of Data, National...

  5. Public lighting.

    NARCIS (Netherlands)

    2011-01-01

    Visual perception is very important for road users and in the dark it can be facilitated by public lighting. Public lighting has a mostly positive road safety effect. Installing public lighting on roads that were previously unlit generally results in fewer and less serious crashes. This effect seems

  6. Limitations on quantum key repeaters.

    Science.gov (United States)

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  7. Secret Key Generation for a Pairwise Independent Network Model

    CERN Document Server

    Nitinawarat, Sirin; Barg, Alexander; Narayan, Prakash; Reznik, Alex

    2010-01-01

    We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of terminals. The terminals are then allowed to communicate publicly with all such communication being observed by all the terminals. The objective is to generate a secret key shared by a given subset of terminals at the largest rate possible, with the cooperation of any remaining terminals. Secrecy is required from an eavesdropper that has access to the public interterminal communication. A (single-letter) formula for secret key capacity brings out a natural connection between the problem of secret key generation and a combinatorial problem of maximal packing of Steiner trees in an associated multigraph. An explicit algorithm is proposed for secret key generation based on a maximal packing of Steiner trees in a multigraph; the corresponding maximum rate of Steiner tree packing is thus a lower bound for the secret ...

  8. Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Kumar Rana

    2011-03-01

    Full Text Available Securing mobile ad hoc networks (MANETs is a crucial task for their good deployments. One fundamental aspect of providing confidentiality and authentication is key management. While Public Key Infrastructure (PKI based solutions has provided these properties historically, MANETs are resource constrained and benefit from symmetric key encryption. In this paper, we proposed a certificateless efficient group key management scheme (CE-GKMS in MANETs for group confidentiality which uses identity based cryptography for secure multicast group communication. The scheme does not need PKI in which mobile nodes needs large storage to carry certificates and to perform public key cryptography based large computation. The scheme introduced a new idea of hiding the public keys and making them visible only to the trusted nodes which not only make it difficult for cryptanalyst to crack the private information but also permit to keep small value of encryption and decryption component causes asymmetric cryptography operation faster. For scalability and dynamic reconfigurability, we divide the network into groups. Leaders in these groups securely communicate with each other to agree on group key in response to membership change and member mobility-induced events. The performance results prove the effectiveness of our proposed key management scheme CE-GKMS.

  9. Incentive Institution Design for Public Project Agent:A Perspective of Key Governance Factors Integration%公共项目代建人激励制度设计--关键治理因子整合视角的研究

    Institute of Scientific and Technical Information of China (English)

    严敏

    2016-01-01

    公共项目代建制面临在现有制度安排下进一步改善其制度效率的重要课题,而基于项目治理的代建人激励容易在政府业主部门和代建人之间形成代理型治理问题,即治理机制激励不足。鉴于此,通过文献分析理清了代建人激励制度的多维度治理机制构成,构建了各维度治理因子测量量表,并通过因子分析对该量表的维度结构进行验证,初步形成了代建人激励制度的多维度概念模型,在此基础上,利用相关分析讨论了概念模型中各维度关键治理因子之间的关联性,依据关联性所形成的作用效应设计了相应的代建人激励制度方案。研究结果表明,在项目治理视角下,代建人激励制度包括多维度关键治理因子,且各维度治理因子之间存在耦合作用,能够更有效地激励代建人的积极履约行为。研究结论将为政府业主部门构建更为综合、高效的代建人激励制度提供理论依据。%It's important for public project agent construction system to improve the effectiveness sustainably within existed institution arrangement .Agent incentive based on project governance often led to proxy governance problems w hich oc‐curred between the public sectors and the agent .The article analysis a multi‐dimension structure of governance mechanism for the incentive framework ,and established a measurement scale for governance factors included in the multi‐dimension structure .It confirmed the dimension structure by factor analysis ,and formed multi‐dimension conceptual model of agent incentive .It discussed possible relevance of key governance factors through correlation analysis ,and established an agent incentive strategy based on the relevance effect .It showed that the agent incentive framework contains multi‐dimension key governance factors ,and a kind of coupling effect exists among those factors .It could drive the agent to provide

  10. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    Science.gov (United States)

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  11. New Financing Schemes of Public Infrastructure

    Directory of Open Access Journals (Sweden)

    Ignacio de la Riva

    2017-01-01

    Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.

  12. Challenging Assumptions of International Public Relations: When Government Is the Most Important Public.

    Science.gov (United States)

    Taylor, Maureen; Kent, Michael L.

    1999-01-01

    Explores assumptions underlying Malaysia's and the United States' public-relations practice. Finds many assumptions guiding Western theories and practices are not applicable to other countries. Examines the assumption that the practice of public relations targets a variety of key organizational publics. Advances international public-relations…

  13. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  14. Key Findings for Interpersonal Skills

    Science.gov (United States)

    2013-12-04

    2005). Beyond difference and domination? Intercultural communication in legal contexts. Intercultural discourse and communication . The essential...trainable and consequential to warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms...warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms; allowing civilian

  15. Keys to the Natural World.

    Science.gov (United States)

    Misiti, Frank L., Jr.

    1996-01-01

    Presents a lesson that uses the learning cycle to introduce the concept of classification and the use of dichotomous keys to identify plants and animals. Encourages students to become better observers and helps them gain confidence and experience in using simple classification keys. (JRH)

  16. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Harinarayan Tiwari; Nayan Sharma

    2015-10-01

    This paper presents fundamental outcomes from an experimental study on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). Hydrodynamic performance was tested in a circulated open channel that comprised of PKW and sand bed (d50 = 0.25 mm). Instantaneous velocities were measured at 20 cross sections using Laser Doppler Velocimeter (LDV) with constant discharge and depth. Average velocity and turbulence intensities in both directions were investigated. Average longitudinal velocities are found very much consistent at every point and maximum around the midway of inlet key. In transverse direction, flow is bifurcating in two directions which are also confirmed by average transverse velocity estimation. Variation of turbulence intensity presents average 10 times higher transverse turbulence than longitudinal turbulence near inlet key of PKW.

  17. Design of an Efficient Neural Key Distribution Centre

    CERN Document Server

    Bisalapur, Sahana S

    2011-01-01

    The goal of any cryptographic system is the exchange of information among the intended users without any leakage of information to others who may have unauthorized access to it. A common secret key could be created over a public channel accessible to any opponent. Neural networks can be used to generate common secret key. In case of neural cryptography, both the communicating networks receive an identical input vector, generate an output bit and are trained based on the output bit. The two networks and their weight vectors exhibit a novel phenomenon, where the networks synchronize to a state with identical time-dependent weights. The generated secret key over a public channel is used for encrypting and decrypting the information being sent on the channel. This secret key is distributed to the other vendor efficiently by using an agent based approach.

  18. Social media in public health.

    Science.gov (United States)

    Kass-Hout, Taha A; Alhinnawi, Hend

    2013-01-01

    While social media interactions are currently not fully understood, as individual health behaviors and outcomes are shared online, social media offers an increasingly clear picture of the dynamics of these processes. Social media is becoming an increasingly common platform among clinicians and public health officials to share information with the public, track or predict diseases. Social media can be used for engaging the public and communicating key public health interventions, while providing an important tool for public health surveillance. Social media has advantages over traditional public health surveillance, as well as limitations, such as poor specificity, that warrant additional study. Social media can provide timely, relevant and transparent information of public health importance; such as tracking or predicting the spread or severity of influenza, west nile virus or meningitis as they propagate in the community, and, in identifying disease outbreaks or clusters of chronic illnesses. Further work is needed on social media as a valid data source for detecting or predicting diseases or conditions. Also, whether or not it is an effective tool for communicating key public health messages and engaging both, the general public and policy-makers.

  19. Smartphones Could Make Keys Obsolete

    Institute of Scientific and Technical Information of China (English)

    Matt Richtel

    2011-01-01

    @@ Front pockets and purses are slowly being emptied of one of civilization's most basic and enduring tools: the key.It's being swallowed by the cellphone.New technology lets smartphones unlock hotel, office and house doors and open garages and even car doors. It's a not-too-distant cousin of the technology that allows key fobs to remotely unlock automobiles or key cards to be waved beside electronic pads at office entrances.What's new is that it is on the device more people are using as the Swiss Army knife of electronics, in equal parts phone, memo pad, stereo, map, GPS unit, and camera and game machine.

  20. Public knowledge and public trust.

    Science.gov (United States)

    Cunningham-Burley, Sarah

    2006-01-01

    As health care applications derived from human genetics research are likely to move increasingly from 'clinic to community', there is growing interest not just in how patients understand and take up health-related genetic information but also in the views of the wider population, as well as a range of professional groups. In this paper, issues relating public knowledge and public trust are raised and discussed in an attempt to move forward debates about public involvement in genomic research and the role of sociologists within interdisciplinary teams. As the field of public understanding of science has developed, we have seen a shift from a focus on the lack of scientific literacy as problem to a recognition of the range of different knowledges that people have and use as they confront science and technology in their everyday lives. As a mood for dialogue pervades many institutions in their relations with 'publics', attention must now be paid to the way in which knowledge and expertise is expressed, heard and acted upon in dialogic encounters. There is increasing concern about public trust in science and calls to increase public confidence, particularly through more open engagement with a range of publics. However, lack of trust or loss of confidence may be constructed as problems rather than reflecting empirical reality, where more complex relationships and attitudes prevail. Lack of trust is often privatized, deeply rooted in lived experience and routinely managed. Trust relations are generally characterized by ambivalence, uncertainty and risk, and are always provisional. Drawing on selected literature and empirical research to review and illustrate this field, this paper argues that scepticism or ambivalence on the part of publics are not necessarily problems to be overcome in the interest of scientific progress, but rather should be mobilized to enhance open and public debates about the nature and direction of genomics research, medicine, and the related

  1. Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kyngn Jung Kim

    2011-05-01

    Full Text Available Many medical systems are currently equipped with a large number of tiny, non-invasive sensors, located on, or close to, the patient’s body for health monitoring purposes. These groupings of sensors constitute a body sensor network (BSN. Key management is a fundamental service for medical BSN security. It provides and manages the cryptographic keys to enable essential security features such as confidentiality, integrity and authentication. Achieving key agreement in BSNs is a difficult task. Many key agreement schemes lack sensor addition, revocation, and rekeying properties, which are very important. Our proposed protocol circumvents these shortcomings by providing node rekeying properties, as well as node addition and revocation. It proposes a key distribution protocol based on public key cryptography—the RSA (Rivest, Shamir and Adleman algorithm, and the DHECC (Diffie-Hellman Elliptic Curve Cryptography algorithm. The proposed protocol does not trust individual sensors, and partially trusts the base station (hospital. Instead of loading full pair-wise keys into each node, after installation our protocol establishes pair-wise keys between nodes according to a specific routing algorithm. In this case, each node doesn’t have to share a key with all of its neighbors, only those involved in the routing path; this plays a key role in increasing the resiliency against node capture attacks and the network storage efficiency. Finally we evaluate our algorithm from the BSN security viewpoint and evaluate its performance in comparison with other proposals.

  2. New Security Results on Encrypted Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2003-12-15

    Schemes for encrypted key exchange are designed to provide two entities communicating over a public network, and sharing a (short) password only, with a session key to be used to achieve data integrity and/or message confidentiality. An example of a very efficient and ''elegant'' scheme for encrypted key exchange considered for standardization by the IEEE P1363 Standard working group is AuthA. This scheme was conjectured secure when the symmetric-encryption primitive is instantiated via either a cipher that closely behaves like an ''ideal cipher,'' or a mask generation function that is the product of the message with a hash of the password. While the security of this scheme in the former case has been recently proven, the latter case was still an open problem. For the first time we prove in this paper that this scheme is secure under the assumptions that the hash function closely behaves like a random oracle and that the computational Diffie-Hellman problem is difficult. Furthermore, since Denial-of-Service (DoS) attacks have become a common threat we enhance AuthA with a mechanism to protect against them.

  3. Public opinion on public services

    NARCIS (Netherlands)

    Evelien Eggink; Debbie Verbeek-Oudijk; Evert Pommer

    2013-01-01

    Original titel: Burgers over de kwaliteit van publieke diensten Most citizens come into contact with public services, for example as a patient, as a student or pupil, as a passenger on public transport or as a museum visitor. More and more importance is being attached to the quality of those service

  4. Slips of the Typewriter Key.

    Science.gov (United States)

    Berg, Thomas

    2002-01-01

    Presents an analysis of 500 submorphemic slips of the typewriter key that escaped the notice of authors and other proofreaders and thereby made their way into the published records of scientific research. (Author/VWL)

  5. Security of Quantum Key Distribution

    CERN Document Server

    Renner, R

    2005-01-01

    We propose various new techniques in quantum information theory, including a de Finetti style representation theorem for finite symmetric quantum states. As an application, we give a proof for the security of quantum key distribution which applies to arbitrary protocols.

  6. Key Statistics for Thyroid Cancer

    Science.gov (United States)

    ... and Treatment? Thyroid Cancer About Thyroid Cancer Key Statistics for Thyroid Cancer How common is thyroid cancer? ... remains very low compared with most other cancers. Statistics on survival rates for thyroid cancer are discussed ...

  7. Wiki keys on mobile devices

    OpenAIRE

    Weber, Gisela; Hagedorn, Gregor

    2010-01-01

    The development of increasingly powerful mobile devices like PDAs (Personal Digital Assistants) and Smartphones, with larger displays and greater resolution makes them increasingly suitable for identification tools available directly “in the field”. One of several approaches towards this aim in the KeyToNature project is based on wiki-stored documents. Important features of wiki-based keys, such as hidden text and media information as well as links to glossary entries are su...

  8. Finite-key security analysis for multilevel quantum key distribution

    Science.gov (United States)

    Brádler, Kamil; Mirhosseini, Mohammad; Fickler, Robert; Broadbent, Anne; Boyd, Robert

    2016-07-01

    We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario. The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.

  9. Public Sociology

    DEFF Research Database (Denmark)

    What is the role of sociology in society? How can - and should - sociology contribute with insights relevant and useful to the outside world? Is sociology attuned to accommodate the demands of the wider public and of surrounding society? Who benefits from the knowledge produced and provided...... by sociology? What are the social implications and cultural effects of the knowledge sociology provides and creates? All of these questions, and many others, concern and centre on sociology's relationship to the surrounding society, in short to the ‘public'. All of these questions - and many others...... irrelevance and introversion and the Charybdis of public relevancy and extroversion. But what does it mean to be a ‘public sociologist' in contemporary society and are there really any other ways of doing sociology? What are the requirements of sociologists in a social world increasingly informed and shaped...

  10. Miscellaneous Publications

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Late 19th century Weather Bureau publications and Congressional reports pertaining to weather. Set of Weather Bureau Snowfall Bulletins for Rocky Mountain states...

  11. Public Airports

    Data.gov (United States)

    Earth Data Analysis Center, University of New Mexico — This data set is a vector point digital data structure that contains the locations of General Public Use Airports in the State of New Mexico. It only contains those...

  12. Public meetings

    CERN Multimedia

    Staff Association

    2017-01-01

    Do you have questions about the elections to the Staff Council, 2017 MERIT exercise, EVE and School, LD to IC exercise, CHIS, the Pension Fund… Come get informed and ask your questions at our public meetings. These public meetings are also an opportunity to get the more information on current issues. Benefit from this occasion to get the latest news and to discuss with the representatives of the statutory body that is the Staff Association!

  13. Authenticated group Diffie-Hellman key exchange: theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Chevassut, Olivier [Catholic Univ. of Louvain, Louvain-la-Neuve (Belgium)

    2002-10-01

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  14. Security of a key agreement protocol based on chaotic maps

    Energy Technology Data Exchange (ETDEWEB)

    Han Song [Curtin University of Technology, G.P.O. Box U1987 Perth, WA 6845 (Australia)], E-mail: s.han@curtin.edu.au

    2008-11-15

    Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev's encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.'s system. In order to address Bergamo et al.' attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.'s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server's communications.

  15. Ising Spin-Based Error Correcting Private-Key Cryptosystems

    Institute of Scientific and Technical Information of China (English)

    ZHENG Dong; ZHENG Yan-fei; FAN Wu-ying

    2006-01-01

    Ising spin system has been shown to provide a new class of error-correction code and can be used to construct public-key cryptosystems by making use of statistical mechanics. The relation between Ising spin systems and private-key cryptosystems are investigated. Two private-key systems are based on two predetermined randomly constructed sparse matrices and rely on exploiting physical properties of the Mackay-Neal (MN) low-density parity-check (LDPC) error-correcting codes are proposed. One is error correcting private-key system, which is powerful to combat ciphertext errors in communications and computer systems. The other is a private-key system with authentication.

  16. A Signcryption based Light Weight Key Exchange Protocol

    Science.gov (United States)

    Feng, Yong; Wei, Qian; Zhang, Xing

    Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature allows anyone to verify its validity using the corresponding public key. In this paper, we propose a signcryption based light weight key exchange protocol named SLWKE which can provide resistance to traditional attacks, i.e., eavesdropping, deducing, replaying, interleaving, forging and repudiating, and unknown key-share attack and save computational cost by three modular calculations, i.e., one modular inversion, one modular addition and one modular multiplicative, included in a signature s and communicational overhead by secure length of IqI in comparison to signcryption based direct key exchange using a time-stamp protocol termed Dkeuts.

  17. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  18. The KUSC Classical Music Dataset for Audio Key Finding

    Directory of Open Access Journals (Sweden)

    Ching-Hua Chuan

    2014-08-01

    Full Text Available In this paper, we present a benchmark dataset based on the KUSC classical music collection and provide baseline key-finding comparison results. Audio key finding is a basic music information retrieval task; it forms an essential component of systems for music segmentation, similarity assessment, and mood detection. Due to copyright restrictions and a labor-intensive annotation process, audio key finding algorithms have only been evaluated using small proprietary datasets to date. To create a common base for systematic comparisons, we have constructed a dataset comprising of more than 3,000 excerpts of classical music. The excerpts are made publicly accessible via commonly used acoustic features such as pitch-based spectrograms and chromagrams. We introduce a hybrid annotation scheme that combines the use of title keys with expert validation and correction of only the challenging cases. The expert musicians also provide ratings of key recognition difficulty. Other meta-data include instrumentation. As demonstration of use of the dataset, and to provide initial benchmark comparisons for evaluating new algorithms, we conduct a series of experiments reporting key determination accuracy of four state-of-the-art algorithms. We further show the importance of considering factors such as estimated tuning frequency, key strength or confidence value, and key recognition difficulty in key finding. In the future, we plan to expand the dataset to include meta-data for other music information retrieval tasks.

  19. Post-processing procedure for industrial quantum key distribution systems

    Science.gov (United States)

    Kiktenko, Evgeny; Trushechkin, Anton; Kurochkin, Yury; Fedorov, Aleksey

    2016-08-01

    We present algorithmic solutions aimed on post-processing procedure for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of classical public communication channel is also considered.

  20. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  1. Going public

    DEFF Research Database (Denmark)

    Meyer, Gitte; Sandøe, Peter

    2012-01-01

    The paper addresses issues of scientific conduct regarding relations between science and the media, relations between scientists and journalists, and attitudes towards the public at large. In the large and increasing body of literature on scientific conduct and misconduct, these issues seem...... deal with ethical public relations issues, guided by a norm or maxim of openness. Drawing on and rethinking the CUDOS codification of the scientific ethos, as it was worked out by Robert K. Merton in 1942, we propose that this, which is echoed in current codifications of norms for good scientific...... conduct, contains a tacit maxim of openness which may naturally be extended to cover the public relations of science. Discussing openness as access, accountability, transparency and receptiveness, the argumentation concentrates on the possible prevention of misconduct with respect to, on the one hand...

  2. Going public

    DEFF Research Database (Denmark)

    Meyer, Gitte; Sandøe, Peter

    2012-01-01

    The paper addresses issues of scientific conduct regarding relations between science and the media, relations between scientists and journalists, and attitudes towards the public at large. In the large and increasing body of literature on scientific conduct and misconduct, these issues seem...... deal with ethical public relations issues, guided by a norm or maxim of openness. Drawing on and rethinking the CUDOS codification of the scientific ethos, as it was worked out by Robert K. Merton in 1942, we propose that this, which is echoed in current codifications of norms for good scientific...... conduct, contains a tacit maxim of openness which may naturally be extended to cover the public relations of science. Discussing openness as access, accountability, transparency and receptiveness, the argumentation concentrates on the possible prevention of misconduct with respect to, on the one hand...

  3. Public Sphere

    DEFF Research Database (Denmark)

    Trenz, Hans-Jörg

    2015-01-01

    of the collective will of the people in the act of democratic self-government. The concept of the public sphere is used across the fields of media and communication research, cultural studies and the humanities, the history of ideas, legal and constitutional studies as well as democracy studies. Historically......In modern societies, the public sphere represents the intermediary realm that supports the communication of opinions, the discovery of problems that need to be dealt with collectively, the channeling of these problems through the filter of the media and political institutions, and the realization......, public spheres have undergone structural transformations that were closely connected to the emergence of different mass media. More recently, they are subject to trends of transnationalization and digitalization in politics and society....

  4. Public Sphere

    DEFF Research Database (Denmark)

    Trenz, Hans-Jörg

    2015-01-01

    In modern societies, the public sphere represents the intermediary realm that supports the communication of opinions, the discovery of problems that need to be dealt with collectively, the channeling of these problems through the filter of the media and political institutions, and the realization......, public spheres have undergone structural transformations that were closely connected to the emergence of different mass media. More recently, they are subject to trends of transnationalization and digitalization in politics and society....... of the collective will of the people in the act of democratic self-government. The concept of the public sphere is used across the fields of media and communication research, cultural studies and the humanities, the history of ideas, legal and constitutional studies as well as democracy studies. Historically...

  5. Abstracts and Key Words of Major Articles

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    A Psychological Interpretation of Zhou Zuoren's Surrender to Japan YUAN Liang-jun(Institute of Literature of China Academy of Social Science, Beijing, 100732) Abstract: As far as Zhou Zuoren was concerned, the decade beginning with the publication in 1935 of Qin Kui and Yue Fei and ending with the Japanese announcement of unconditional surrender in August 1945 was an abyss of spiritual misery. Despite his complete knowledge of his surrender to Japan as a road of no return allowing no comeback once embarked on, he failed to refuse temptations and slid into the abyss step by step. It should be acknowledged that he suffered from a complicated state of mind during the ten years of misery. Key words: Zhou Zuoren; surrender to Japan; state of mind; a supervisor's state of mind; a prisoner's state of mind

  6. public spaces

    Directory of Open Access Journals (Sweden)

    Elena Grigoryeva

    2013-01-01

    Full Text Available The topic of this issue is PUBLIC SPACES. It is familiar and clear to every citizen. The streets and courtyards as childhood experiences remain with us forever. And these are the places where we come with our parents at weekends, where we meet friends, where we have dates and where we already come for a walk with our children.The history of public spaces is long and captivating. It was the main city squares where the most important events took place in history. The Agoras of Ancient Greece and the Roman Forums, the squares of Vatican, Paris and London, Moscow and Saint Petersburg… Greve, Trafalgar, Senate, Palace, Red, Bolotnaya – behind every name there is life of capitals, countries and nations.Public spaces, their shapes, image and development greatly influence the perception of the city as a whole. Both visitors and inhabitants can see in public spaces not only the visage but the heart, the soul and the mind of the city.Unfortunately, sometimes we have to prove the value of public spaces and defend them from those who consider them nothing but a blank space, nobody’s land destined for barbarous development.What should happen to make citizens perceive public spaces as their own and to make authorities consider development and maintenance of squares and parks their priority task against the  background of increasing competition between cities and the fight for human capital? Lately they more often say about “a high-quality human capital”. And now, when they say “the city should be liveable” they add “for all groups of citizens, including the creative class”.

  7. Key comparison of liquid density standards

    Science.gov (United States)

    Buchner, Christian; Zelenka, Zoltan; Kajastie, Heikki; Madec, Tanguy; Wolf, Henning; Vámossy, Csilla; Lorefice, Salvatore; Garberg, Torgunn; Lenard, Elżbieta; Spohr, Isabel; Mares, Gabriela; Spurný, Robert; Lumbreras, Angel; Medina, Nieves; Y Akçadağ, Ümit; Perkin, Michael

    2015-01-01

    Hydrostatic density determination for liquids is mainly performed by laboratories to provide means for calibrating liquid density measuring instruments such as oscillation-type density meters. From 2002 to 2005 the CIPM key comparison CCM.D-K2 'comparison of liquid density standards' was carried out piloted by the PTB. The aim was to compare the results of the density determination by the participating laboratories to support entries to the CMC tables in this sub-field. To provide further laboratories the possibility to support their entries to the CMC tables at the meeting of the EUROMET Working Group on Density in 2007 this comparison was agreed on. BEV (Austria) organized the comparison supported by the PTB (Germany). For the comparison samples of pentadecane, water, tetrachloroethylene and of an oil of high viscosity were measured in the temperature range from 5 °C to 60 °C at atmospheric pressure by hydrostatic weighing. The measurements were completed in 2008. The reference values of the first reports based on the draft of the CCM.D-K2. After the official publication of the CCM.D-K2 the reference values were recalculated and the report was finalised in 2015. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  8. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  9. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so...

  10. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  11. Key Skills Influencing Student Achievement

    Science.gov (United States)

    Balch, Tonya; Gruenert, Steve

    2009-01-01

    A predictive, non-experimental, cross-sectional design (Johnson, 2001) was used to conduct a study to determine if elementary administrators' key counseling skills and select demographics predicted state-level student performance indicators in their respective schools. A secondary purpose of this study was to develop a valid and reliable on-line…

  12. Ten Keys to the Portal

    Science.gov (United States)

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  13. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  14. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin;

    2016-01-01

    We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...

  15. Overview, conclusions, and key recommendations

    NARCIS (Netherlands)

    Loeber, R.; Farrington, D.P.; Howell, J.C.; Hoeve, M.; Loeber, R.; Farrington, D.P.

    2012-01-01

    Section I of this chapter summarizes the most important points of Chapters 2 to 5 and relevant portions of Chapter 10 (which concerns European issues) by addressing key findings that are relevant for juveniles’ transition of offending from adolescence (up to age 18) into adulthood. Section I focuses

  16. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken...

  17. Public by Day, Private by Night: Examining the Private Lives of Kenya's Public Universities

    Science.gov (United States)

    Wangenge-Ouma, Gerald

    2012-01-01

    This article examines the emergence of the public university in Kenya as a key provider of private higher education, characterised mainly by the phenomenon of the "private public university student." It probes the broader socio-economic reforms circumscribing the privatisation of Kenya's public universities and the local and global forces…

  18. Public by Day, Private by Night: Examining the Private Lives of Kenya's Public Universities

    Science.gov (United States)

    Wangenge-Ouma, Gerald

    2012-01-01

    This article examines the emergence of the public university in Kenya as a key provider of private higher education, characterised mainly by the phenomenon of the "private public university student." It probes the broader socio-economic reforms circumscribing the privatisation of Kenya's public universities and the local and global…

  19. Public health

    NARCIS (Netherlands)

    Berg, van den A.E.

    2007-01-01

    Agnes van den Berg wrote an essay about human health and nature, establishing that subject as an important policy argument in developing (urban) nature in the Netherlands. She studied the public balance of fear and fascination for nature, summarising benefits on human health. In this chapter, she ad

  20. Public Affairs.

    Science.gov (United States)

    Snow, C. P.

    In this book effects of technological developments on world conditions are discussed on the basis of the author's public statements made between 1959-70. A total of seven pieces is presented under the headings: The Two Cultures and the Scientific Revolution, The Two Cultures: A Second Look, The Case of Leavis and the Serious Case, Science and…

  1. Public health

    NARCIS (Netherlands)

    Berg, van den A.E.

    2007-01-01

    Agnes van den Berg wrote an essay about human health and nature, establishing that subject as an important policy argument in developing (urban) nature in the Netherlands. She studied the public balance of fear and fascination for nature, summarising benefits on human health. In this chapter, she

  2. Publication Design.

    Science.gov (United States)

    Nelson, Roy Paul

    This book is designed to solve the problem of coordinating art and typography with content in publications. Through text and illustrations, this book suggests ways to make pages and spreads in magazines, newspapers, and books attractive and readable. As a book of techniques, it is directed at potential and practicing art directors, designers, and…

  3. Publication Design.

    Science.gov (United States)

    Nelson, Roy Paul

    This book is designed to solve the problem of coordinating art and typography with content in publications. Through text and illustrations, this book suggests ways to make pages and spreads in magazines, newspapers, and books attractive and readable. As a book of techniques, it is directed at potential and practicing art directors, designers, and…

  4. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  5. New Public Management and Evaluation

    NARCIS (Netherlands)

    F.B.L. van der Meer (Frans-Bauke)

    2007-01-01

    textabstractIn this chapter I will discuss what evaluation does and can contribute to insight in the dynamics and effects of (new) public management reforms. To do so, I pose three key ques-tions: 1. How is evaluation actually applied in relation to NPM-reforms? 2. How are evaluation results used an

  6. Public Engagement for Responsible Research and Innovation

    NARCIS (Netherlands)

    Steinhaus, Norbert; Mulder, Henk; de Marree, Jozefien; Pratt, Chris

    2016-01-01

    In this paper we will elaborate on the role of Public Engagement in research (PE) as a key approach to achieve RRI. We will use PE as an umbrella term, encompassing Community Engagement and Community-Based Research as well.

  7. A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

    Directory of Open Access Journals (Sweden)

    Alexander Klimm

    2011-01-01

    Full Text Available Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in the field due to loss or damage of tokens. This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. The main goal of the proposed scheme is the minimization of online dependencies to Trusted Third Parties, Certification Authorities, or the like, to enable key flashing in remote locations with only minor technical infrastructure. Introducing trusted mediator devices, new tokens can be authorized and later their public key can be flashed into a mobile system on demand.

  8. Performance in Public Organizations: Clarifying the Conceptual Space

    DEFF Research Database (Denmark)

    Andersen, Lotte Bøgh; Boesen, Andreas; Holm Pedersen, Lene

    2016-01-01

    Performance in public organizations is a key concept that requires clarification. Based on a conceptual review of research published in 10 public administration journals, this article proposes six distinctions to describe the systematic differences in performance criteria: From which stakeholder'...

  9. Anonymous-key quantum cryptography and unconditionally secure quantum bit commitment

    CERN Document Server

    Yuen, H P

    2000-01-01

    A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.

  10. Cryptanalysis of Xinyu et al.'s NTRU-Lattice Based Key Exchange Protocol

    OpenAIRE

    Valluri, Maheswara Rao

    2016-01-01

    Xinyu et al. proposed a public key exchange protocol, which is based on the NTRU-lattice based cryptography. In this paper, we show how Xinyu et al.'s NTRU-KE: A lattice based key exchange protocol can be broken, under the assumption that a man-in-the middle attack is used for extracting private keys of users who participate in the key exchange protocol.

  11. Key drivers of airline loyalty

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  12. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  13. Key to Language Learning Success

    OpenAIRE

    2015-01-01

    This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these rol...

  14. Key Questions in Thoracic Surgery

    OpenAIRE

    Subotic, Dragan R.

    2016-01-01

    This 1000-page textbook encompasses much more than the title suggests. In fact, the title “Key questions in thoracic surgery and pulmonology” would be more fitting. The specific format of the book, with precise questions and evidence-based, but equally clear answers covering all relevant fields of pulmonology and thoracic surgery, makes this 40-chapter book a “must read” not only for residents, but also for senior pulmonologists and thoracic surgeons.

  15. Innovation, Key to Lasting Success

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Oerlikon Textile will be exhibiting at ITMA ASIA 2010 in Shanghai on its 750- -plus stand C 51/C 52 in hall W2 from 22 to 26 June 2010. Highlights of the five brands under the umbrella of the textile machinery manufacturer include the new Autoconer X5 winding machine, a new FDY technology and the Era embroidery machine. Their technological innovations illustrate the slogan under which Oerlikon Textile is appearing at the show: Innovation remains the key to success.

  16. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  17. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications

    Institute of Scientific and Technical Information of China (English)

    JIANG Jun; HE Chen

    2005-01-01

    In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and "challenge-response" techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.

  18. The 33rd Annual Phi Delta Kappa/Gallup Poll of the Public's Attitudes Toward the Public Schools.

    Science.gov (United States)

    Rose, Lowell C.; Gallup, Alec M.

    2001-01-01

    Presents results of the 33rd Annual Phi Delta Kappa/Gallup Poll on the public's attitudes toward the public schools. Includes a summary of key findings and tables showing percentage distributions of responses to each question. (PKP)

  19. What Cultural Values Influence American Public Relations Practitioners?

    Science.gov (United States)

    Vasquez, Gabriel M.; Taylor, Maureen

    1999-01-01

    Examines the role of culture as a key variable in public relations research and practice. Finds (1) American practitioners continue to practice one-way models of public relations; and (2) public relations practitioners who have collectivistic values tend to practice two-way models of public relations. Discusses implications for theory and…

  20. Florida's Opinion on K-12 Public Education Spending

    Science.gov (United States)

    Forster, Greg

    2006-01-01

    This scientifically representative poll of 1,200 Floridians finds that public opinion about K-12 public education spending is seriously misinformed. Floridians think public schools need more money, but the main reason is that they are badly mistaken about how much money the public schools actually get. Key findings of the study include: (1) Half…

  1. Public Sociology

    DEFF Research Database (Denmark)

    What is the role of sociology in society? How can - and should - sociology contribute with insights relevant and useful to the outside world? Is sociology attuned to accommodate the demands of the wider public and of surrounding society? Who benefits from the knowledge produced and provided...... by sociology? What are the social implications and cultural effects of the knowledge sociology provides and creates? All of these questions, and many others, concern and centre on sociology's relationship to the surrounding society, in short to the ‘public'. All of these questions - and many others...... - will be addressed in this book.   Sociology, as the self-proclaimed ‘the science of society', finds itself in an exceptional position within the scientific community in that it studies a universe it itself is part and parcel of. This means that sociology and sociologists are inextricably connected and linked...

  2. Scientific publication

    Directory of Open Access Journals (Sweden)

    Getulio Teixeira Batista

    2007-06-01

    Full Text Available The necessary work for developing a scientific publication is sometimes underestimated and requires the effective participation of many players to obtain a result in good standard. Initially it depends upon the determination of the authors that decide to write the scientific article. Scientific writing is a very challenging and time consuming task, but at the same time essential for any scientist. A published scientific article is unquestionably one of the main indicators of scientific production, especially if published in a qualified scientific journal with highly qualified editorial committee and strict peer review procedure. By looking at evaluation criteria for scientific production of the several Thematic Scientific Committees of the Brazilian Council for Scientific and Technological Development (CNPq it becomes clear publications in scientific journals that has certified quality is the most important item in the evaluation of a scientist production.

  3. Public opinion.

    Science.gov (United States)

    Holden, A

    2013-04-01

    This opinion-based article aims to highlight the worrying decline in support for dental public health as a specialty. Not only is this specialty important for its role in commissioning services, it is crucial for the identification of vulnerable groups in society and ensuring dental services are acceptable and assessable for these populations. Dental public health also addresses the social determinants of health in its approach, acknowledging the impact of these in perpetuating inequalities and looking for multisectoral approaches to their management. This article also looks at the lack of appreciation for these determinants in dental foundation training and how a change in the structure of the programme could both address this and the current shortage of places.

  4. Public meetings

    CERN Multimedia

    Staff Association

    2012-01-01

    MARS PENSIONS CONTRACT POLICY GENERAL INFORMATION   PUBLIC MEETINGS COME AND BE INFORMED! Public meetings Monday 15 Oct. 2 pm Amphi IT, 31-3-004 Meyrin Wednesday 17 Oct. 10 am Amphi BE, 864-1-D02 Prévessin Thursday 18 Oct. 10 am Salle du Conseil/ Council Chamber 503-1-001 Meyrin Thursday 18 Oct. 2 pm Filtration Plant, 222-R-001(in English) Meyrin   Overview of the topics to be discussed Recognition of Merit – MARS Outcome of last exercise 2007 to 2012 : lessons learned Pension Fund Capital preservation policy : what is it ? Contract policy LC2IC statistics SA proposal General information CVI 2013 Voluntary programmes (PRP, SLS)  

  5. How Public Is Public Administration? A Constitutional Approach of Publicness

    Science.gov (United States)

    Ringeling, Arthur

    2015-01-01

    Both in Public Administration and in practice, there is a loss of the concept of public. A view became dominant in which markets were superior to governments and public to private. Not only did the esteem of the public sphere diminish, but also its significance in our reasoning and teaching. It became less clear what the public sphere stood for.…

  6. How Public Is Public Administration? A Constitutional Approach of Publicness

    Science.gov (United States)

    Ringeling, Arthur

    2015-01-01

    Both in Public Administration and in practice, there is a loss of the concept of public. A view became dominant in which markets were superior to governments and public to private. Not only did the esteem of the public sphere diminish, but also its significance in our reasoning and teaching. It became less clear what the public sphere stood for.…

  7. Key Obama officials leave administration

    Science.gov (United States)

    Showstack, Randy

    2013-01-01

    Secretary of the Interior Ken Salazar is one of the latest members of the Obama administration to announce that he is leaving his position near the start of President Obama's second term in office. Salazar, who has served as interior secretary since January 2009, intends to leave the department by the end of March, the department noted on 16 January. Salazar joins a number of other key officials who are planning to leave the administration. They include Environmental Protection Agency administrator Lisa Jackson, National Oceanic and Atmospheric Administration administrator Jane Lubchenco, and U.S. Geological Survey director Marcia McNutt.

  8. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  9. Key paediatric messages from Amsterdam

    Directory of Open Access Journals (Sweden)

    Jonathan Grigg

    2016-04-01

    Full Text Available The Paediatric Assembly of the European Respiratory Society (ERS maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress.

  10. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory......, is responsible for the report, which is based on literature studies. Post Doc Stefan Krüger Nielsen, Risø National Laboratory, has contributed to parts of the report, including the description of the IEA energyscenarios, the IEA statistics on R&D and the description of the science and technology base of biomass...

  11. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  12. Managing Public Accountability : How Public Managers Manage Public Accountability

    NARCIS (Netherlands)

    Schillemans, Thomas

    2015-01-01

    Accountability is of growing importance in contemporary governance. The academic literature on public accountability is fraught with concerned analyses, suggesting that accountability is a problematic issue for public managers. This article investigates how public managers experience accountability

  13. Public Education and Growth in Developing Countries

    DEFF Research Database (Denmark)

    Schuppert, Christiane; Wirz, Nadja

    Human capital plays a key role in fostering technology adoption, the major source of economic growth in developing countries. Consequently, enhancing the level of human capital should be a matter of public concern. The present paper studies public education incentives in an environment in which...

  14. Mechanisms of Change in Public Management Projects

    OpenAIRE

    Tiina Soininen

    2013-01-01

    This article draws conclusions from four separate case evaluations from different development programs in Finland and aims to discuss the role of welfare state values in new public management. The study develops a comprehensive picture of the change in public management since 2000. The synthesis of the four case studies follows the critical realism tradition. This article shows that cooperation forms the key mechanism ...

  15. Key Technologies and Applications of Secure Multiparty Computation

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Guo

    2013-07-01

    Full Text Available With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introduced several key technologies of secure multiparty computation: secret sharing and verifiable secret sharing, homomorphic public key cryptosystem, mix network, zero knowledge proof, oblivious transfer, millionaire protocol. Second we discussed the applications of secure multiparty computation in electronic voting, electronic auctions, threshold signature, database queries, data mining, mechanical engineering and other fields.

  16. Results-based management - Developing one's key results areas (KRAs).

    Science.gov (United States)

    Kansal, Om Prakash; Goel, Sonu

    2015-01-01

    In spite of aspiring to be a good manager, we public health experts fail to evaluate ourselves against our personal and professional goals. The Key Result Areas (KRAs) or key performance indicators (KPIs) help us in setting our operational (day-to-day) and/or strategic (long-term) goals followed by grading ourselves at different times of our careers. These shall help in assessing our strengths and weaknesses. The weakest KRA should set the maximum extent to which one should use his/her skills and abilities to have the greatest impact on his/her career.

  17. Public meetings

    CERN Multimedia

    Staff Association

    2014-01-01

      MARS 2015 FIVE YEARLY REVIEW CONTRACT POLICY PENSION FUND GENERAL INFORMATION   COME AND BE INFORMED! PUBLIC MEETINGS Friday 3rd October at 10 am Amphi BE, 864-1-D02 Prévessin Friday 3rd October at 2 pm Salle du Conseil / Council Chamber, 503-1-001 (in English) Meyrin Monday 6th October at 10 am Kjell Johnsen Auditorium, 30-7-018 Meyrin Monday 6th October at 2 pm Salle du Conseil / Council Chamber, 503-1-001 Meyrin  

  18. Public meetings

    CERN Multimedia

    Staff Association

    2014-01-01

      Public meetings : Come and talk about your future employment conditions !   The Staff Association will come and present the results of our survey on the 2015 five-yearly review. Following the survey, the topics discussed, will be contract policy, recognition of merit (MARS), working time arrangements and family policy. After each meeting and around a cup of coffee or tea you will be able to continue the discussions. Do not hesitate to join us, the five-yearly review, it is with YOU!

  19. A public world without public relations?

    OpenAIRE

    Nayden, Nikolay

    2015-01-01

    The term "public relations" (PR) has long gained currency as meaning the practice of producing a positive public image. This article argues that public relations should be released from the prison of "PR" and, instead, reconceptualised as relations which define the public realm much as economic relations define the economy. From this point of view, three main levels of public relations can be distinguished: (1) relations between public institutions, (2) relations between citizens and public i...

  20. A public world without public relations?:

    OpenAIRE

    Nayden, Nikolay

    2009-01-01

    The term "public relations" (PR) has long gained currency as meaning the practice of producing a positive public image. This article argues that public relations should be released from the prison of "PR" and, instead, reconceptualised as relations which define the public realm much as economic relations define the economy. From this point of view, three main levels of public relations can be distinguished: (1) relations between public institutions, (2) relations between citizens and public i...

  1. Green spaces – a key resources for urban sustainability. The GreenKeys approach for developing green spaces

    Directory of Open Access Journals (Sweden)

    Carlos Smaniotto Costa

    2008-01-01

    Full Text Available Following the principles of sustainable development all urban development programmes set down ideas and ideals to develop our cities in a more long-lasting way, especially concerning the environment and the social dimension. These programmes result from a process of searching for and then offering a better quality of life. Green space assumes a key role for improving the quality of urban life - not only because of their ecological and environmental functions but also of their relevance for public health, societal well-being and economic benefits they can provide. Urban green spaces are therefore key resources for sustainable cities. Starting with this principle the GreenKeys Project developed a methodology to approach better green space qualities. Then if we are unable to demonstrate effectively the value that green spaces deliver we risk green spaces remaining on the periphery of public policy priorities and unable to attract more resources. The article presents and discusses the results and outcomes of the GreenKeys Project. Especially the GreenKeys proposal for supporting the formulation of an Urban Green Space Strategy is widely discussed.

  2. Public perceptions of geology

    Science.gov (United States)

    Gibson, Hazel; Stewart, Iain; Anderson, Mark; Pahl, Sabine; Stokes, Alison

    2014-05-01

    Geological issues are increasingly intruding on the everyday lives of ordinary people. Whether it be onshore exploration and extraction of oil and gas, deep injection of water for geothermal power or underground storage of carbon dioxide and radioactive waste, many communities across Europe are being faced with potentially contested geological activity under their backyard. As well as being able to communicate the technical aspects of such work, geoscience professionals also need to appreciate that for most people the subsurface is an unfamiliar realm. In order to engage communities and individuals in effective dialogue about geological activities, an appreciation of what 'the public' already know and what they want to know is needed, but this is a subject that is in its infancy. In an attempt to provide insight into these key issues, this study examines the concerns the public have, relating to geology, by constructing 'Mental Models' of people's perceptions of the subsurface. General recommendations for public engagement strategies will be presented based on the results of selected case studies; specifically expert and non-expert mental models for communities in the south-west of England.

  3. Some keys to reread authority.

    Directory of Open Access Journals (Sweden)

    Edgar Straehle

    2015-12-01

    Full Text Available This article vindicates a rereading of the concept of authority and tries to dissociate this concept from the concept of power in order to undo their identification and thereby the oblivion of the specific nature (or the history of authority. Besides, this rereading must not be confused with an apology of authority but with an exploration about this complicated and ambivalent category. The key point of this distinction lies in that authority, unlike power, depends not on itself but on the other person, the person who acknowledges another one as authority. Therefore, authority can be compatible with freedom and can appear as an exteriority of power, which undermines it or even becomes a counterpower. Hence the logical endeavours of power to monopolize and instrumentalize authority.

  4. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  5. Key Aspects of Wave Energy

    DEFF Research Database (Denmark)

    Margheritini, Lucia; Nørgaard, Jørgen Harck

    2012-01-01

    Diversification of renewable energy sources is fundamental to ensure sustainability. In this contest, wave energy can provide a substantial contribution as soon as the sector breaks into the market. In order to accelerate shift from a technology to a market focus and reduce technical and non...... be used as a breakwater therefore providing a solid structure for harbor protection; the Wave Star can be used as a base for offshore wind and photovoltaic installation in the middle of the sea, realizing an hybrid renewable energy platform. It is the authors´ believe that taking wave energy devices......-technical risks, it is critical to provide comprehensive and reliable information on the technologies without neglecting attractive advantages. It is possible to underline a different key of lecture of wave energy performance by considering efficiency and power production as well as device versatility...

  6. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  7. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  8. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  9. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-02-14

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model.

  10. Public meeting

    CERN Multimedia

    HR Department

    2010-01-01

    Dear Colleagues, I am pleased to invite you to a public meeting which will be held on Thursday 11 November 2010 at 2:30 p.m., in the Main Auditorium (welcome coffee from 2 p.m.) In this meeting Sigurd Lettow, Director for Administration and General Infrastructure will present the Management’s proposals towards restoring full funding of the Pension Fund. The meeting will follow discussions which took place with the Staff Association, at the Standing Concertation Committee (CCP) of 1 November 2010 and will be held with the Members States, at the Tripartite Employment Conditions Forum (TREF) of 4 November 2010. You will be able to attend this presentation in the Main Auditorium or via the webcast. The Management will also be available to reply to your questions on this subject. Best regards, Anne-Sylvie Catherin

  11. Public meetings

    CERN Multimedia

    Staff Association

    2013-01-01

    MARS SURVEY 5YR 2015 GENERAL INFORMATION ELECTIONS 2013   COME AND BE INFORMED! Public meetings Tuesday 1st Oct. 10 am Amphi IT, 31-3-004 Meyrin Tuesday 1st Oct. 2 pm Council Chamber, 503-1-001 Meyrin Friday 4 Oct. 10 am Amphi BE, 864-1-D02 Prévessin Monday 7 Oct. 2 pm Council Chamber, 503-1-001 (in English) Meyrin Tuesday 8 Oct. 10 am Amphi Kjell Johnsen, 30-7-018 Meyrin   Overview of the topics to be discussed Recognition of Merit – MARS Outcome of last exercise 2007 to 2013: lessons learned Survey: five-yearly review, give us your opinion General information CVI 2014 Voluntary programmes (PRP, SLS) Elections 2013 Renewal of the Staff Council 2014 - 2015  

  12. Public Entrepreneurship

    DEFF Research Database (Denmark)

    Hjorth, Daniel

    2013-01-01

    on the entrepreneurship–society relationship. SE, as all entrepreneurship practices, operates by social and economic forces (limiting ourselves to those here), and generates social and economic outcomes (amongst others). Its second half, however, dominates the concept of SE, and our analysis seek to remedy this imbalance......In this paper we want to affirm the desiring-social-change that we find in practices presently represented by theorists and policy-makers as examples of ‘social entrepreneurship’ (SE). We do this as an attempt to intensify the presence of the social and sociality in today's discourse...... by focusing on the social productivity of entrepreneurship, on entrepreneurship desiring social change. We suggest ‘public entrepreneurship’ might grasp this as a more balanced concept that will also support a more precise analysis of the entrepreneurship–society relationship....

  13. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee....

  14. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  15. SLAR image interpretation keys for geographic analysis

    Science.gov (United States)

    Coiner, J. C.

    1972-01-01

    A means for side-looking airborne radar (SLAR) imagery to become a more widely used data source in geoscience and agriculture is suggested by providing interpretation keys as an easily implemented interpretation model. Interpretation problems faced by the researcher wishing to employ SLAR are specifically described, and the use of various types of image interpretation keys to overcome these problems is suggested. With examples drawn from agriculture and vegetation mapping, direct and associate dichotomous image interpretation keys are discussed and methods of constructing keys are outlined. Initial testing of the keys, key-based automated decision rules, and the role of the keys in an information system for agriculture are developed.

  16. A novel key management scheme using biometrics

    Science.gov (United States)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  17. Public History

    Directory of Open Access Journals (Sweden)

    Marta Gouveia de Oliveira Rovai

    2017-04-01

    Full Text Available Este artigo tem como proposta apresentar o conceito e as práticas de História Pública como um novo posicionamento da ciência histórica em diálogo com profissionais da comunicação, no sentido de produzir e divulgar as experiências humanas. Para isso, discute-se a origem do conceito de História Pública e as diferentes formas de educação histórica que a utilização das novas tecnologias podem proporcionar (dentre elas a internet. Nesse sentido, convida-se o leitor para a reflexão sobre as possibilidades de publicização e de democratização do conhecimento histórico e da cultura, ampliando-se a oportunidade de produção, de divulgação e de acesso do público a diferentes formas experiências no tempo. O artigo também intenciona chamar atenção dos profissionais que lidam com a História e com a Comunicação para os perigos de produções exclusivamente submetidas ao mercado que transformam a popularização da História no reforço de estigmas culturais.   PALAVRAS-CHAVE: História Pública; Educação histórica e Comunicação; democratização e estigmatização.     ABSTRACT This article aims to present the concept and practices of Public History as a new positioning of historical science in dialogue with communication professionals, in the sense of producing and disseminating human experiences. For this, the origin of the concept of Public History and the different forms of historical education that the use of the new technologies can provide (among them the Internet is discussed. In this sense, the reader is invited to reflect on the possibilities of publicizing and democratizing historical knowledge and culture, expanding the opportunity for production, dissemination and public access to different forms of experience in time. The article also intends to draw attention from professionals dealing with History and Communication to the dangers of exclusively commercialized productions that transform the popularization

  18. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  19. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  20. GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS

    Directory of Open Access Journals (Sweden)

    Anatoly Beletsky

    2016-03-01

    Full Text Available The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is based on the use of generalized Galois arrays of isomorphism relationship with forming elements, and depending on the selected irreducible polynomial generating matrix. A simple method for constructing generalized Galois matrix by the method of filling the diagonal. In order to eliminate the isomorphism of Galois arrays and their constituent elements, limiting the possibility of building one-way functions, Galois matrix subjected to similarity transformation carried out by means of permutation matrices. The variant of the organization of the algebraic attacks on encryption keys sharing protocols and discusses options for easing the consequences of an attack.

  1. "Having choices is the key".

    Science.gov (United States)

    Ogunleye, B

    1996-08-01

    When Chief Bisi Ogunleye was appointed Nigeria's Minister of Agriculture, the US-educated daughter of a tribal chief still believed that most Nigerian farmers were men. As she traveled throughout the country fulfilling her role, she met a group of women who wanted to start a palm oil and casaba processing plant but lacked the means to get a start-up loan. Chief Ogunleye's efforts to get officials to issue a loan were ridiculed, so she asked her husband to allow her to donate part of her salary to the women. With the $45 from the chief, the women began business and within 3 months had 6 times the original amount. This money was used to help other 6 other women's groups start businesses. By 1985, these efforts were so successful that the chief resigned her government job and founded the Country Women's Association of Nigeria, which has been successful in helping women because it realizes that the most important key to empowerment is having choices.

  2. 41 CFR Appendix A to Subpart C of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart C of Part 102 Public Contracts and Property Management Federal Property... 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be applied to situations...

  3. 41 CFR Appendix A to Subpart E of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart E of Part 102 Public Contracts and Property Management Federal Property... A to Subpart E of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may...

  4. 41 CFR Appendix A to Subpart D of... - 3-Key Points and Principles

    Science.gov (United States)

    2010-07-01

    ... Principles A Appendix A to Subpart D of Part 102 Public Contracts and Property Management Federal Property... Subpart D of Part 102-3—Key Points and Principles This appendix provides additional guidance in the form of answers to frequently asked questions and identifies key points and principles that may be...

  5. A note on parallel executions of restrictive blind issuing protocols for secret-key certificates

    NARCIS (Netherlands)

    Brands, S.A.

    1995-01-01

    The receiver in a restrictive blind certificate issuing protocol can blind the issued public key and the certificate but not a certain blinding-invariant predicate of the secret key. Recently a generally applicable technique was described for designing restrictive blind issuing protocols for a certa

  6. Public meeting

    CERN Multimedia

    Staff Association

    2015-01-01

    Last Monday at 9 a.m. the Council Chamber was full, with several people standing, for the public meeting of the Staff Association. Simultaneously, many of our colleagues followed the presentations in the Amphitheatre in Prévessin. We would like to thank all of you for the interest you have shown and for your feedback. In the introduction we explained how the Staff Association represents the staff in its discussions with Management and Member States, and how the staff itself defined, by its participation in the 2013 staff survey, the priority assigned to various points related to the employment conditions. The position of the Staff Association regarding the new contract policy, to be implemented as of 31 March 2015 after approval by Council, was stated. Then, in the framework of the 2015 five-yearly review, the general approach that we would like to see for the new career structure, was explained. Concerning diversity, based on what we know about the situation in other international organiza...

  7. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen

    2014-09-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to \\'steal\\' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  8. A Key Management Scheme for ZigBee in AMI of Smart Grid

    Institute of Scientific and Technical Information of China (English)

    Jianquan Liang; Xianji Jin; Shuidong Dai; Weiming Tong; Zhongwei Li

    2016-01-01

    Advanced metering infrastructure ( AMI) is a critical part of the smart grid, and ZigBee is playing an increasingly important role in AMI. The cyber security is the prerequisite to ensure the reliable operation of AMI. To guarantee the ZigBee communication security in AMI, a key management scheme based on the elliptic curve cryptosystem ( ECC) is proposed. According to the ways of information transformation in AMI, the scheme is categorized as unicast communication key management process and multicast communication key management process. And in the scheme, the selection of elliptic curve, the calculation of ZigBee node’ s ECC public key and private key, the establishment and distribution of the link key in unicast communication, and the establishment and distribution of the network key in multicast communication are elaborated. The analysis results show that the proposed key management scheme is secure, and consumes less memory and energy, thus, can meet the demands of communication security of AMI.

  9. Arm's length delegation of public services

    DEFF Research Database (Denmark)

    Bennedsen, Morten; Schultz, Christian

    2011-01-01

    Delegation is a key feature of political decision making: Mayors or prime ministers delegate to subordinates, voters delegate to elected representatives. We analyze the effect of political delegation on public service provision and the choice between private or public providers when contracts are...... position vis a vis a private firm with market power. In general, these effects imply that delegation improves public service provision.......Delegation is a key feature of political decision making: Mayors or prime ministers delegate to subordinates, voters delegate to elected representatives. We analyze the effect of political delegation on public service provision and the choice between private or public providers when contracts...... are incomplete and incentives therefore distorted. We identify two important effects: The incentive effect increases the incentive part of service providers' remuneration and delegation may therefore be a substitute for an explicit complete incentive contract. The bargaining effect improves the bargaining...

  10. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  11. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  12. [Brazilian bibliographical output on public oral health in public health and dentistry journals].

    Science.gov (United States)

    Celeste, Roger Keller; Warmling, Cristine Maria

    2014-06-01

    The scope of this paper is to describe characteristics of the scientific output in the area of public oral health in journals on public health and dentistry nationwide. The Scopus database of abstracts and quotations was used and eight journals in public health, as well as ten in dentistry, dating from 1947 to 2011 were selected. A research strategy using key words regarding oral health in public health and key words about public health in dentistry was used to locate articles. The themes selected were based on the frequency of key words. Of the total number of articles, 4.7% (n = 642) were found in oral health journals and 6.8% (n = 245) in public health journals. Among the authors who published most, only 12% published in both fields. There was a percentile growth of public oral health publications in dentistry journals, though not in public health journals. In dentistry, only studies indexed as being on the topic of epidemiology showed an increase. In the area of public health, planning was predominant in all the phases studied. Research to evaluate the impact of research and postgraduate policies in scientific production is required.

  13. From Public Relations to Corporate Public Diplomacy

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2017-01-01

    -win solutions supported by the general public. While existing research suggests that an important function of public relations is to create a perception of legitimacy and that the hope of economic and commercial public diplomacy is to create a perception of attractiveness among the public in foreign countries...

  14. Public Space, Public Waste, and the Right to the City.

    Science.gov (United States)

    Chikarmane, Poornima

    2016-08-01

    I draw on my experiences as an organizer with a waste-pickers collective, Kagad Kach Patra Kashtakari Panchayat in Pune, India, to reflect on the power dynamics in control of public space. The Pune Municipal Corporation (PMC), a public body, has used public resources to facilitate and enable accumulation by private companies, who have not been able to produce what they had committed to in the processing of waste. The waste pickers, in alliance with affected village-based land agitation committees, have mobilized against the dumping that is ruining their way of life, environments, and health, and are fighting for their own integration into waste value chains. The article uses the frame of David Harvey's(1) "right to the city"; a key part of the mobilizing work with waste pickers has been Freirean conscientization methods to spread awareness of the economic importance, to the city and to the planet, of waste recycling.

  15. Factors impacting time to acceptance and publication for peer-reviewed publications.

    Science.gov (United States)

    Toroser, Dikran; Carlson, Janice; Robinson, Micah; Gegner, Julie; Girard, Victoria; Smette, Lori; Nilsen, Jon; O'Kelly, James

    2017-07-01

    Timely publication of data is important for the medical community and provides a valuable contribution to data disclosure. The objective of this study was to identify and evaluate times to acceptance and publication for peer-reviewed manuscripts, reviews, and letters to the editor. Key publication metrics for published manuscripts, reviews, and letters to the editor were identified by eight Amgen publications professionals. Data for publications submitted between 1 January 2013 and 1 November 2015 were extracted from a proprietary internal publication-tracking database. Variables included department initiating the study, publication type, number of submissions per publication, and the total number of weeks from first submission to acceptance, online publication, and final publication. A total of 337 publications were identified, of which 300 (89%) were manuscripts. Time from submission to acceptance and publication was generally similar between clinical and real-world evidence (e.g. observational and health economics studies) publications. Median (range) time from first submission to acceptance was 23.4 (0.2-226.2) weeks. Median (range) time from first submission to online (early-release) publication was 29.7 (2.4-162.6) weeks. Median (range) time from first submission to final (print) publication was 36.2 (2.8-230.8) weeks. Time from first submission to acceptance, online publication, and final publication increased accordingly with number of submissions required for acceptance, with similar times noted between each subsequent submission. Analysis of a single-company publication database showed that the median time for manuscripts to be fully published after initial submission was 36.2 weeks, and time to publication increased accordingly with the number of submissions. Causes for multiple submissions and time from clinical trial completion to first submission were not assessed; these were limitations of the study. Nonetheless, publication planners should consider

  16. Leadership in Search of Public Value

    DEFF Research Database (Denmark)

    Pedersen, Dorthe

    2016-01-01

    and governmentality studies, a set of key tensions inherent in the public value discourse are identified as the diagnostic impetus to consider the somewhat excessive leadership figure put forward in the literature. The chapter shows that the discourse of networked governance and public value thinking is rather...... varying values and identities. This form of hybrid leadership calls for new explorative learning formats in public leadership programs, it is argued. Originality/value: The chapter undertakes a careful critical reading and conceptual examination of the current paradigm of public value management...

  17. Management Control, Results-Oriented Culture and Public Sector Performance : Empirical Evidence on New Public Management

    NARCIS (Netherlands)

    Verbeeten, Frank H M; Speklé, Roland F.

    2015-01-01

    New Public Management (NPM) has been guiding public sector reform for over 25 years. Its position on the design of effective management control rests on three key ideas: (1) performance improvement requires a results-oriented culture that emphasizes outcomes rather than inputs or processes; (2) publ

  18. 基于政府职能转变的体育职业资格认证改革研究%Reform of the Sports Vocational Qualification Certification Based on the Function Transform of Government

    Institute of Scientific and Technical Information of China (English)

    史曙生

    2016-01-01

    Occupational qualification authentication plays an important role in standardizing the market order,promoting public employment,fostering econ⁃omy and protecting public interests etc. But in the process of occupational qualification authentication,some problems,which consist of certificate flooding, chaotic management,power rent-seeking etc,have a serious negative influence. It is attached great importance by Chinese government. With the new round of deepening the reform in the administrative system,it is a main measure that“reducing the occupational qualification permission and recognition”in the gov⁃ernment to transform functions. Based on this background,the paper generalizes the sports occupational qualification authentication system.Sports occupa⁃tional qualification authentication is too administration-oriented and the government is too much to involve in the specific affairs of sports occupation qualifi⁃cation authentication. A lack of related legislation on sports occupational qualification authentication ,excessive governmental discretionary power of occupa⁃tion qualification authentication and inappropriate expansion of access to sports certification ,hindered the development of the market and employment to some extent. The sports occupation qualification authentication lacks of strict supervision. Power for occupation qualification authentication is too concentra⁃tive. There is hidden power in rent-seeking corruption. On this basis,according to the requirement of the government to transform functions,put forward the strategies:Strengthen the legislation construction,strictly implement the legal management and restrict the discretionary power in administrative permission;Cultivate the social organization,pilot in sports associations carrying out authentication and reduce the government's involvement in the specific affairs of sports occupation qualification authentication;Strengthen the supervision function,innovate the supervision

  19. US public perspectives on security

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale [Univ. of Oklahoma, Norman, OK (United States); Jenkins-Smith, Hank C. [Univ. of Oklahoma, Norman, OK (United States); Silva, Carol L. [Univ. of Oklahoma, Norman, OK (United States)

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  20. US public perspectives on security :

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2012-02-01

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.