WorldWideScience

Sample records for public key certificate

  1. An investigation of DUA caching strategies for public key certificates

    Energy Technology Data Exchange (ETDEWEB)

    Cheung, T.C.

    1993-11-01

    Internet Privacy Enhanced Mail (PEM) provides security services to users of Internet electronic mail. PEM is designed with the intention that it will eventually obtain public key certificates from the X.500 directory service. However, such a capability is not present in most PEM implementations today. While the prevalent PEM implementation uses a public key certificate-based strategy, certificates are mostly distributed via e-mail exchanges, which raises several security and performance issues. In this thesis research, we changed the reference PEM implementation to make use of the X.500 directory service instead of local databases for public key certificate management. The thesis discusses some problems with using the X.500 directory service, explores the relevant issues, and develops an approach to address them. The approach makes use of a memory cache to store public key certificates. We implemented a centralized cache server and addressed the denial-of-service security problem that is present in the server. In designing the cache, we investigated several cache management strategies. One result of our study is that the use of a cache significantly improves performance. Our research also indicates that security incurs extra performance cost. Different cache replacement algorithms do not seem to yield significant performance differences, while delaying dirty-writes to the backing store does improve performance over immediate writes.

  2. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    OpenAIRE

    Yang Lu; Jiguo Li

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certific...

  3. Disseminated Public-Key Management and Certificate Generation Scheme for MANET

    Directory of Open Access Journals (Sweden)

    Sanjay Kumar Chowlam

    2011-07-01

    Full Text Available In this paper, we first discuss the predominant assail abilities in the mobile ad hoc networks, which have made it much easier to prone to attacks than the traditional wired network. Then we discuss the basic operations of our public-key management scheme: creation of public (and private keys, issuing public-key certificates, storage of certificates, and key authentication by the nodes themselves without the control of any principal authority. More over the public key management scheme serves as an underlying mechanism for both key distribution and establishing security relationships between nodes.

  4. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    Science.gov (United States)

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  5. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  6. Security Issues of the Digital Certificates within Public Key Infrastructures

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance, a research paper has mentioned how a PKI security may be violated by MD5 collision over information from the certificates. In order to develop further studies on the topic a serious knowledge about certificate structure is necessary.

  7. Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and Acquisition of Companies

    Directory of Open Access Journals (Sweden)

    Balachandra Muniyal

    2012-10-01

    Full Text Available The Public Key Infrastructure(PKI provides facilities for data encryption, digital signature and timestamping. It is a system where different authorities verify and authenticate the validity of each participantwith the use of digital certificates. A Certificate Policy (CP is a named set of rules and it indicatesthe applicability of a certificate in a Public Key Infrastructure. Sometimes two companies or organizationswith different PKIs merge. Therefore it would be necessary that their PKIs are also able to merge.Sometimes, the unification of different PKIs is not possible because of the different certificate policies.This paper presents a method to compare and assess certificate policies during merger and acquisitionof companies.

  8. Secure Digital Certificate Design Based on the Public Key Cryptography Algorithm

    Directory of Open Access Journals (Sweden)

    Zhang Qi ming

    2013-07-01

    Full Text Available     With the popularity of the Internet, more and more people choose online shopping, however, in the case of lacking security measures, there is a great deal of risk on the Internet. to this situation,In response to this situation, this paper presents a digital certificate based on the X.509 standard. This paper uses the C language generation public key algorithm (RSA,Realization of the digital certificate registration, verification and certificate generation process,the identity of certification users can be verified and provide proof of identity on the Internet transactions ,reducing the transaction risks greatly , ensuring the user's property and interests are not infringed.

  9. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  10. A note on parallel executions of restrictive blind issuing protocols for secret-key certificates

    NARCIS (Netherlands)

    Brands, S.A.

    1995-01-01

    The receiver in a restrictive blind certificate issuing protocol can blind the issued public key and the certificate but not a certain blinding-invariant predicate of the secret key. Recently a generally applicable technique was described for designing restrictive blind issuing protocols for a certa

  11. New Public Key Certificate Revocation Scheme Based on One-way Hash Chain%基于单向散列链的公钥证书撤销机制

    Institute of Scientific and Technical Information of China (English)

    李景峰; 潘恒; 祝跃飞

    2006-01-01

    证书撤销是公钥基础设施(PKI,Public Key Infrastructure)研究和应用的难点问题.本文首先讨论了当前应用最广泛的两类证书撤销机制-证书撤销列表(CRL, Certificate Revocation List)和在线证书状态协议(OCSP, Online Certificate Status Protocol),剖析了这两种机制各自存在的不足.在此基础上,提出了一种基于单向散列链的证书撤销机制.

  12. Key Impact Factors to Success of Forest Certification

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Forest certification has developed very quickly across the world as one of the most important market initiative to promote sustainable forest management (SFM). Its success and effectiveness are influenced by some key factors, including credibility, cost effectiveness, certification standard, effectiveness, equitableness, government's role and laws/regulations framework. The paper analyzed these key factors to the success of forest certification and put forward relevant suggestions and advices for China to d...

  13. China Initiates Voluntary Certification of Public Security Products

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    @@ Reporters learned from the Certification and Accreditation Administration of China(CNCA)that burglar-proof door became the first batch of voluntary certification product in public security products.China has formally initiated voluntary certification of public security products.

  14. Public key infrastructure building trusted applications and web services

    CERN Document Server

    Vacca, John R

    2004-01-01

    OVERVIEW OF PKI TECHNOLOGYPublic Key Infrastructures (PKIs): What Are They?Type of Certificate Authorities (CAS) ServicesPKI StandardsTypes of Vendor and Third-Party CA SystemsProtecting Private KeysCA System AttacksStolen Private Keys: What Can Be Done?Certificate Practice StatementsPKI ReadinessANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURESPKI Design IssuesCost Justification and ConsiderationPKI Standards Design IssuesPKI Architectural Design ConsiderationsIMPLEMENTING PKIRequirementsImplementation ScheduleImplementation CostsPKI PerformanceMANAGING PKIRequesting a CertificateObtaining a

  15. Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Fa-gen; GAO Jun-tao; LIU Shuang-gen; HU Yu-pu

    2006-01-01

    This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).

  16. 空间信息网基于证书的混合式公钥基础设施%Certificate-based hybrid public key infrastructure for space information networks

    Institute of Scientific and Technical Information of China (English)

    任方; 马建峰; 郝选文

    2012-01-01

    考察了由卫星和接入节点所构成的分层式空间信息网模型,首次提出了一种适用于该网络模型的基于证书的公钥基础设施。该模型中作为核心网络的卫星层采用分布式CA管理证书,而其他节点作为接入节点,其证书管理采用集中式CA。该模型具有很强的可扩展性和一定的安全性,适用于空间信息网复杂而多变的环境。%With the development of space communication technologies, security issues in space information networks become increasingly important. However, there has been no good solution to this problem in satellite networks. This paper investigates the layered model of space information networks, which consist infrastructure suitable for of satellites and access nodes; and proposes a certificate-based public key the this model. In this model, the Certificate Management of satellite layer uses distributed CA, and the Certificate Management of other nodes (as access nodes) uses centralized CA. The proposed mode is highly scalable and has a certain degree of safety. So it is applicable to the complex and changeable environment in space information networks.

  17. Wisconsin Certification Manual for Public Librarians. Bulletin No. 7075.

    Science.gov (United States)

    Wisconsin State Dept. of Public Instruction, Madison. Div. of Library Services.

    Designed to be used as a guide for public librarians and boards of trustees in meeting the requirements of Wisconsin's public librarian certification law, this manual is divided into two major sections covering public librarian certification and certification renewal/continuing education requirements. The first section includes discussions of…

  18. KeyChains: A Decentralized Public-Key Infrastructure

    Science.gov (United States)

    2006-03-02

    exposed. This problem is easily solved in KeyChains, taking inspiration from existing techniques: certificate expiration, revocation lists and online...the peer. The peer maintains an access control list indicating what operations (key storage, key retrieval, and peer management) are permitted to a...2002, Norfolk, VA, September 2002. [9] http://www.umiacs.umd.edu/˜mmarsh/ CODEX /. [10] A. Datta, M. Hauswirth, and K. Aberer. Beyond ”web of trust

  19. Self-organized key management with trusted certificate exchange in MANET

    Directory of Open Access Journals (Sweden)

    Saju P John

    2015-03-01

    Full Text Available In MANET, security is more challenging due to problems related to key exchange. It is necessary to secure the exchanges in MANETs for assuring the development of services in the network. The self-organized MANET is visualized as a key communication technology enabler for application such as network centric warfare, disaster relief operations, emergency situations, and intelligent transportation systems. In this paper, we propose a self-organized key management technique coupled with trusted certificate exchange for mobile ad hoc networks. The proposed architecture consists of one coordinator node, servers and normal mobile nodes. The coordinator acts as a mediator for transmitting the message among the servers and mobile nodes. Each node generates its own public/private key pairs using server-signed public keying technique. Then multi-path certificate exchange technique is employed where public key of the nodes is certified by different nodes. Those nodes that issued the certificates are validated using the Eigen Vector Reputation Centrality. By simulation results, we show that the proposed approach improves security.

  20. Quantum Public-Key Cryptosystem

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-03-01

    Quantum one-way functions play a fundamental role in cryptography because of its necessity for the secure encryption schemes taking into account the quantum computer. In this paper our purpose is to establish a theoretical framework for a candidate of the quantum one-way functions and quantum trapdoor functions based on one-parameter unitary groups. The dynamics of parameterized unitary groups ensure the one-wayness and quantum undistinguishability in different levels, and the physical feasibility are derived from the simultaneous approximation of its infinitesimal generators. Moreover, these special functions are used to construct new cryptosystems-the quantum public-key cryptosystems for encrypting both the classical and quantum information.

  1. Applied public-key steganography

    Science.gov (United States)

    Guillon, Pierre; Furon, Teddy; Duhamel, Pierre

    2002-04-01

    We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a suspicion-free digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the Scalar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stego-system following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.

  2. 77 FR 21145 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-04-09

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign Air..., Inc. (``People Express'') requesting a certificate of public convenience and necessity...

  3. 76 FR 54524 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-09-01

    ... TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and... August 20, 2011 The following Applications for Certificates of Public Convenience and Necessity and..., Inc. (``Universal'') requesting a certificate of public convenience and necessity...

  4. 76 FR 10429 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-02-24

    ... TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and... February 12, 2011 The following Applications for Certificates of Public Convenience and Necessity and... certificate of public convenience and necessity authorizing interstate charter air transportation....

  5. Quantum Key Distribution Protocol with Private-Public Key

    OpenAIRE

    Serna, Eduin H.

    2009-01-01

    A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.

  6. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    used trust mechanism. Many studies used certificate-based public key manage- ent. However, they have brought out practical limitations cluding high...certificate-based public key management hemes cited above expose practical limitations, including eeding a centralized trusted CA [25] , high...ent sociability derived from the trust profile availabl a priori as well as dynamic social behavior measure by the number of nodes that a node

  7. A threshold key escrow scheme based on public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.

  8. Public-Key Encryption with Delegated Search

    NARCIS (Netherlands)

    Ibraimi, Luan; Nikova, Svetla; Hartel, Pieter; Jonker, Willem

    2011-01-01

    In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message. Bob's company, Carol, cannot scan his email for mali

  9. Restrictive blind issuing of secret-key certificates in parallel mode

    NARCIS (Netherlands)

    Brands, S.A.

    1995-01-01

    Recently a class of secret-key certificate issuing protocols has been proposed that is believed to be restrictive blind when run in sequential mode. In this report an immunization technique is proposed for modifying these secret-key certificate issuing protocols in order to make them restrictive bli

  10. 7 CFR 652.24 - Certification process for public agencies.

    Science.gov (United States)

    2010-01-01

    ... CONSERVATION SERVICE, DEPARTMENT OF AGRICULTURE SUPPORT ACTIVITIES TECHNICAL SERVICE PROVIDER ASSISTANCE... services on behalf of and under the auspices of the public agency's certification; (2) Require that the public agency have, at all times, an individual that is a certified technical service provider and is...

  11. Quantum walk public-key cryptographic system

    Science.gov (United States)

    Vlachou, C.; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2015-12-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public-key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public key generation and encryption/decryption procedures.

  12. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  13. Security analysis of public key watermarking schemes

    Science.gov (United States)

    Craver, Scott A.; Katzenbeisser, Stefan

    2001-12-01

    Traditional watermarking systems require the complete disclosure of the watermarking key in the watermark verification process. In most systems an attacker is able to remove the watermark completely once the key is known, thus subverting the intention of copyright protection. To cope with this problem, public-key watermarking schemes were proposed that allow asymmetric watermark detection. Whereas a public key is used to insert watermarks in digital objects, the marks can be verified with a private key. Knowledge of this private key does not allow piracy. We describe two public-key watermarking schemes which are similar in spirit to zero-knowledge proofs. The key idea of one system is to verify a watermark in a blinded version of the document, where the scrambling is determined by the private key. A probabilistic protocol is constructed that allows public watermark detection with probability of 1/2; by iteration, the verifier can get any degree of certainty that the watermark is present. The second system is based on watermark attacks, using controlled counterfeiting to conceal real watermark data safely amid data useless to an attacker.

  14. Quantum walks public key cryptographic system

    OpenAIRE

    Vlachou, C; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2016-01-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that th...

  15. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  16. A String-Based Public Key Cryptosystem

    CERN Document Server

    Andrecut, M

    2014-01-01

    Traditional public key cryptography is based on number theory, and suffers from problems such as dealing with very large numbers and large prime numbers, making key creation cumbersome. Here, we propose a new public key cryptosystem based on strings only, which avoids the difficulties of the traditional number theory approach. The security mechanism for generating public and secret keys is ensured by a recursive encoding mechanism embedded in a quasi-commutative-random function, resulted from the composition of a quasi-commutative function with a pseudo-random function. Due to the inherent construction algorithm of the the proposed cryptosystem, the resulted mathematical inversion problem is likely to be harder than the classical discrete logarithm or integer factorization problems. Furthermore, the proposed cryptosystem is immune against the known quantum algorithm attacks.

  17. 78 FR 18601 - Respirator Certification Fees; Public Meeting

    Science.gov (United States)

    2013-03-27

    ... HUMAN SERVICES Centers for Disease Control and Prevention Respirator Certification Fees; Public Meeting... stakeholders to present information the impact of an increase on respirator fees on individual respirator manufacturers, the respirator market, or on those industries that rely on NIOSH approved respiratory...

  18. 76 FR 33400 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-06-08

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and... May 14, 2011 The following Applications for Certificates of Public Convenience and Necessity...

  19. 76 FR 42762 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-07-19

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and... June 25, 2011 The following Applications for Certificates of Public Convenience and Necessity...

  20. 77 FR 31421 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-05-25

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and... The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  1. 77 FR 37732 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-06-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and... The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  2. 77 FR 59243 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-09-26

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and... September 1, 2012 The following Applications for Certificates of Public Convenience and Necessity...

  3. 76 FR 35939 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-06-20

    ... for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart...

  4. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  5. Applying Evolutionary Algorithm to Public Key Cryptosystems

    Institute of Scientific and Technical Information of China (English)

    Tu Hang; Li Li; Wu Tao-jun; Li Yuan- xiang

    2003-01-01

    A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi degree parallel evolutionary algorithrn to evaluate synthetically the efficiency and security of the public key cryptography. The model con tributes to designing public key cryptography system too.

  6. Dynamic Threshold Public-Key Encryption

    OpenAIRE

    Delerablée, Cécile; Pointcheval, David

    2008-01-01

    The original publication is available at www.springerlink.com; International audience; This paper deals with threshold public-key encryption which allows a pool of players to decrypt a ciphertext if a given threshold of authorized players cooperate. We generalize this primitive to the dynamic setting, where any user can dynamically join the system, as a possible recipient; the sender can dynamically choose the authorized set of recipients, for each ciphertext; and the sender can dynamically s...

  7. 77 FR 54944 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-09-06

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign Air.... (``KaiserAir'') requesting an amended certificate of public convenience and necessity authorizing it...

  8. 78 FR 20372 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits; Notice of...

    Science.gov (United States)

    2013-04-04

    ... Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits; Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier... Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits were...

  9. 49 CFR 1150.23 - Modified certificate of public convenience and necessity.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Modified certificate of public convenience and..., ACQUIRE, OR OPERATE RAILROAD LINES Modified Certificate of Public Convenience and Necessity § 1150.23 Modified certificate of public convenience and necessity. (a) The operator must file a notice with...

  10. 76 FR 10085 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-02-23

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2011 The following Applications for Certificates of Public Convenience and Necessity and Foreign Air... Airlines, Inc., d/b/a Alpha Cargo, and for reissuance of its certificate of public convenience...

  11. 78 FR 75441 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-12-11

    ... Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier... following Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier...

  12. 78 FR 76701 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-12-18

    ... Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier... following Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier...

  13. 75 FR 41564 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2010-07-16

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and... The following Applications for Certificates of Public Convenience and Necessity and Foreign Air.... requesting a certificate of public convenience and necessity to engage in foreign scheduled...

  14. 78 FR 25782 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-05-02

    ... Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier... Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits were...

  15. 76 FR 20435 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-04-12

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity... March 5, 2011. The following Applications for Certificates of Public Convenience and Necessity...

  16. 78 FR 68134 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-11-13

    ... Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier... Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits were...

  17. 78 FR 19354 - Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits

    Science.gov (United States)

    2013-03-29

    ... Office of the Secretary Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier... Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits were...

  18. 76 FR 68256 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-03

    ... for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B... Corporation (``JetBlue'') requesting a certificate of public convenience and necessity and requests...

  19. 77 FR 54945 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-09-06

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign Air... transfer of its certificates of public convenience and necessity to facilitate the reorganization of...

  20. 77 FR 49478 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-08-16

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign Air.../a Transair requesting a certificate of public convenience and necessity authorizing it to engage...

  1. 75 FR 16226 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2010-03-31

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2010 The following Applications for Certificates of Public Convenience and Necessity and Foreign Air.... requesting a certificate of public convenience and necessity to engage in foreign scheduled...

  2. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...

  3. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  4. MOBILE PAYMENTMETHODBASED ON PUBLIC-KEY CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Adnan A. Hnaif

    2015-03-01

    Full Text Available Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash, cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is summarized in three processes: firstly, the authentication process, which involves the authentication phases for the applied customers. Secondly, the member recognition process which tests and ensures the customer membership by the market server. Finally, payment processwhich will be done by ciphering the customer information using public-key encryption cryptosystem (RSA, to be submitted over an insecure network to the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed method. However, to prevent a brute force attack, the choice of the key size becomes crucial.

  5. A New Public-Key Encryption Scheme

    Institute of Scientific and Technical Information of China (English)

    Hai-Bo Tian; Xi Sun; Yu-Min Wang

    2007-01-01

    This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme.As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption,the third version of knowledge of exponent assumption (KEA3).Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2).This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations.The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption.In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.

  6. An Inexpensive Device for Teaching Public Key Encryption

    Science.gov (United States)

    Pendegraft, Norman

    2009-01-01

    An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…

  7. 75 FR 16225 - Certifications Pursuant to Section 609 of Public Law 101-162

    Science.gov (United States)

    2010-03-31

    ... Certifications Pursuant to Section 609 of Public Law 101-162 SUMMARY: On March 24, 2010, the Department of State notified Congress that it had withdrawn Mexico's certification under United States Public Law 101-162...; telephone: (202) 647-2252. SUPPLEMENTARY INFORMATION: Section 609 of Public Law 101-162 prohibits imports...

  8. 75 FR 17988 - Certifications Pursuant to Section 609 of Public Law 101-162

    Science.gov (United States)

    2010-04-08

    ... Certifications Pursuant to Section 609 of Public Law 101-162 SUMMARY: On March 24, 2010, the Department of State notified Congress that it had withdrawn Mexico's certification under United States Public Law 101-162.... SUPPLEMENTARY INFORMATION: Section 609 of Public Law 101-162 prohibits imports of certain categories of...

  9. 75 FR 29601 - Office of the Secretary: Notice of Applications for Certificates of Public Convenience and...

    Science.gov (United States)

    2010-05-26

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  10. 78 FR 63273 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2013-10-23

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... of Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart...

  11. 75 FR 53999 - Office of the Secretary: Notice of Applications for Certificates of Public Convenience and...

    Science.gov (United States)

    2010-09-02

    ... Office of the Secretary: Notice of Applications for Certificates of Public Convenience and Necessity and... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  12. Low-Power Public Key Cryptography

    Energy Technology Data Exchange (ETDEWEB)

    BEAVER,CHERYL L.; DRAELOS,TIMOTHY J.; HAMILTON,VICTORIA A.; SCHROEPPEL,RICHARD C.; GONZALES,RITA A.; MILLER,RUSSELL D.; THOMAS,EDWARD V.

    2000-11-01

    This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.

  13. No certificate, no chocolate

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Are you already ready to use “certificates” to log into CERN or to connect to the global “eduroam” wireless network? No, I am not talking about your birth certificate, medical certificates or academic certificates. I am referring to “certificates” used for authentication where you would usually use a password.   These digital certificates are a valid alternative to cumbersome passwords. Like the aforementioned personal certificates, a digital certificate is an official document that proves who you are or your qualifications. Your personal digital CERN certificate is tied to your digital identity at CERN. In that respect, a digital certificate is like a password. It is a credential that you must not share with anybody else! With your digital certificate, I can impersonate you and take over your mailbox, your web sessions and more… Digital certificates bind your digital identity to a public/private-key infrastructu...

  14. Self-Organized Public-Key Management for Mobile Ad Hoc Networks Based on a Bidirectional Trust Model

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In traditional networks ,the authentication is performed by certificate authoritys(CA),which can't be built in distributed mobile Ad Hoc Networks however. In this paper, we propose a fully self-organized public key management based on bidirectional trust model without any centralized authority that allows users to generate their public-private key pairs, to issue certificates, and the trust relation spreads rationally according to the truly human relations. In contrast with the traditional self-organized public-key management, the average certificates paths get more short,the authentication passing rate gets more high and the most important is that the bidirectional trust based model satisfys the trust requirement of hosts better.

  15. 一种生物证书密钥生成算法%Biometric certificate key generation algorithm

    Institute of Scientific and Technical Information of China (English)

    王金海; 魏宁; 崔军; 李雪妍; 李秀艳

    2016-01-01

    生物特征数字证书涉及的RSA公私钥对可以由近似随机信号的生物特征密钥派生,但是生物特征密钥长度较短,而基于大素数分解困难的RSA算法要求密钥较长.为了解决该问题,提出一种生物证书密钥生成算法,结合对称加密算法和大素数生成算法生成生物大素数,并采用哈希算法对生物大素数进行可用性设计,在解决密钥长度问题的同时保证生物大素数安全可用,以便用于生成生物特征数字证书中的RSA公私钥对.基于VC6.0和MIRACL大数库的实验结果表明:基于生物特征密钥生成的生物大素数满足确定性和可用性,能够应用于生物数字证书之中.本文所提算法行之有效,且具有实际应用价值.%The RSA public and private keys of biometric certificate can be generated from biometric key which can be seen as random numbers.However, the size of biometric key is shorter than the RSA public and private keys. To overcome this limitation, a biometric certificate key generation algorithm is proposed. In this method, the biometric primes is generated by the combination of symmetric key encryption algorithm and prime generation algorithm, in addition, the hashing algorithm is used to ensure the feasibility of the biometric primes. The generated biometric primes are safe and usable so that they can be applied to generate the RSA public and private keys of biometric certificate. Experimental results using VC6.0 and MIRACL show that the proposed method not only is feasible, but also has practical application value.

  16. Unconditionally-secure and reusable public-key authentication

    CERN Document Server

    Ioannou, Lawrence M

    2011-01-01

    We present a quantum-public-key identification protocol and show that it is secure against a computationally-unbounded adversary. This demonstrates for the first time that unconditionally-secure and reusable public-key authentication is possible in principle with (pure-state) public keys.

  17. 3 CFR - Presidential Determination on the Delegation of Certifications Under Section 1512 of Public Law...

    Science.gov (United States)

    2010-01-01

    ... Certifications Under Section 1512 of Public Law 105-261 Presidential Documents Other Presidential Documents... Certifications Under Section 1512 of Public Law 105-261 Memorandum for the Secretary of Commerce By virtue of the authority vested in me as President by the Constitution and the laws of the United States of...

  18. 77 FR 70208 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-11-23

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  19. 76 FR 27167 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-05-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2011 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  20. 78 FR 45011 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2013-07-25

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2013 The following Applications for Certificates of Public Convenience and Necessity and Foreign Air... convenience and necessity in the name of ``ENDEAVOR AIR, INC.''. Barbara J. Hairston, Acting Program...

  1. 77 FR 27832 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-05-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  2. 78 FR 56984 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2013-09-16

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2013 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  3. 77 FR 67731 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-11-13

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  4. 77 FR 13682 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-03-07

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  5. 76 FR 10084 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-02-23

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2011 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  6. 75 FR 39324 - Office of the Secretary: Notice of Applications for Certificates of Public Convenience and...

    Science.gov (United States)

    2010-07-08

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary: Notice of Applications for Certificates of Public Convenience and Necessity and..., 2010 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  7. 76 FR 70210 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2011 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  8. 75 FR 22891 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2010-04-30

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2010 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  9. 77 FR 47691 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-08-09

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  10. 76 FR 72025 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2011 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  11. 77 FR 27833 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-05-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2012 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  12. 76 FR 13444 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-03-11

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF TRANSPORTATION Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and..., 2011 The following Applications for Certificates of Public Convenience and Necessity and Foreign...

  13. A Trusted Centralized Public Key to Secure Border Gateway Protocol

    Directory of Open Access Journals (Sweden)

    Divan Raimagia

    2012-06-01

    Full Text Available The Secure Border Gateway Protocol (S-BGP is used when two different Autonomous System communicate with each other and upon reception of UPDATE from neighbor Autonomous System. A core layer Router in single Autonomous System called BGP speaker first verifies the receiving update and signs the full path with own digital signature and send it to neighbor AS. In Real scenario so many ASes and Routers communicate to each other. So due to several digital signatures mandates, large storage require in router as well as high processor overhead and more time require for sign generation and verification in S-BGP. In this paper, we propose a new approach that less burden on BGP Speaker for verify and generate number of digital signatures using Autonomous System makes trusted through KDC server. The Central KDC Server will send master certificate to validate autonomous system. In this environment each BGP speaker verify only one sign on each update and verify path only between itself and neighbor router. After verification of UPDATE, each BGP speaker sign full path encrypt routing table with neighbor’s public key,

  14. Weak-Keys in Public Key Cryptosystems Based on Discrete Logarithms

    Institute of Scientific and Technical Information of China (English)

    TAI Suiyan; LUO Ping; PENG Xiaoning; WANG Daoshun

    2005-01-01

    The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. The weak-key occurs if the public key is a factor or multiple of the primitive element, in which case the user's private key is not needed but can be obtained based on the character of the public key. An algorithm is presented that can easily test whether there is a weak-key in the cryptosystem. An example is given to show that an attack can be completed for the Elgamal digital signature if a weak-key exists, therefore validating the danger of weak-keys. Methods are given to prevent the generation of these weak-keys.

  15. 76 FR 68257 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-03

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... of Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart...

  16. 77 FR 46146 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-08-02

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  17. 77 FR 39793 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-07-05

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  18. 76 FR 35938 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-06-20

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  19. 一种新的公钥基础设施——SPKI%A New Public Key Infrastructure - SPKI

    Institute of Scientific and Technical Information of China (English)

    张鹏程; 陈克非

    2003-01-01

    Information security is a part of the core of computer field. This existing PKI system can not satisfy themore and more demand from people. Simple Public Key Infrastructure, SPKI, is new standard of public key certifi-cate, which can bring a simple but precise naming and authorization system for distributed computing environment.The base theory of SPKI is presented, and the brief analysis about its study hotspots and shortcomings are also shownin the paper.

  20. One-way quantum identity authentication based on public key

    Institute of Scientific and Technical Information of China (English)

    ZHANG XingLan

    2009-01-01

    Based on public key, a quantum identity authenticated (QIA) system is proposed without quantum entanglement. The public key acts as the authentication key of a user. Following the idea of the classical public key infrastructure (PKI), a trusted center of authentication (CA) is involved. The user selects a public key randomly and CA generates a private key for the user according to his public key. When it is necessary to perform QIA, the user sends a sequence of single photons encoded with its private key and a message to CA. According to the corresponding secret key kept by CA, CA performs the unitary operations on the single photon sequence. At last, the receiver can judge whether the user is an impersonator.

  1. 76 FR 48807 - Public Key Infrastructure (PKI) Certificate Action Form

    Science.gov (United States)

    2011-08-09

    ...) technology to support electronic commerce between the USPTO and its customers. PKI is a set of hardware... its electronic commerce systems, the USPTO uses PKI technology to protect the integrity...

  2. Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings

    Institute of Scientific and Technical Information of China (English)

    SHAO Zu-hua

    2005-01-01

    An efficient authenticated key agreement protocol is proposed, which makes use of bilinear pairings and selfcertified public keys. Its security is based on the security assumptions of the bilinear Diffie-Hellman problem and the computational Diffie-Hellman problem. Users can choose their private keys independently. The public keys and identities of users can be verified implicitly when the session key being generating in a logically single step. A trusted Key Generation Center is no longer required as in the ID-based authenticated key agreement protocols. Compared with existing authenticated key agreement protocols from pairings, the new proposed protocol is more efficient and secure.

  3. Security Notions for Quantum Public-Key Cryptography

    OpenAIRE

    Koshiba, Takeshi

    2007-01-01

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to ad...

  4. Public health - threats, concerns and key actions

    DEFF Research Database (Denmark)

    Czeskleba-Dupont, Rolf

    Public health is discussed departing from priorities related to the precautionary principle with special reference to air pollution from wood burning in individual stoves and the susceptibility of vulnerable groups, i.a. people with genetic predispositions for a lack of detoxifying capacity....

  5. Public health - threats, concerns and key actions

    DEFF Research Database (Denmark)

    Czeskleba-Dupont, Rolf

    Public health is discussed departing from priorities related to the precautionary principle with special reference to air pollution from wood burning in individual stoves and the susceptibility of vulnerable groups, i.a. people with genetic predispositions for a lack of detoxifying capacity....

  6. ISO 9001 - Certificates by industrial sector in the world as a key decision variable

    Directory of Open Access Journals (Sweden)

    Katarzyna Hys

    2015-12-01

    Full Text Available The aim of this article is to present and analyse trends in the scope of the implementation of quality certificates compliant with the ISO 9001 standard. The analysis will concern the trend in the sectoral approach all over the world. The preparation of data, their analysis and drawing conclusions have been made on the basis of the desk research method. The data was gathered by means of an analysis of source materials such as, among others: announcements, press releases, reports for industries, publicly available reports of companies and research institutions, information from the Internet.The main conclusion is the fact that the number of certificates compliant with the ISO 9001 standard is constantly growing in the world. The kind of business activity determines the engagement in the certificate implementation. The subject of research provided conclusions and at the same time, became an inspiration for defining research issues such as the ex-post analysis of the information available, drawing conclusions and drawing up directions of development. The retrospective analysis in the scope of the sectoral analysis of ISO 9001 trends, drawing conclusions and drawing up evolution directions is the author’s original contribution.

  7. Public key cryptosystem and a key exchange protocol using tools of non-abelian group

    Directory of Open Access Journals (Sweden)

    H. K. Pathak,

    2010-07-01

    Full Text Available Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a block ofencrypted data. We propose a new public key cryptosystem and a Key Exchange Protocol based on the generalization of discrete logarithm problem using Non-abelian group of block upper triangular matrices of higher order. The proposed cryptosystem is efficient in producing keys of large sizes without the need of large primes. The security of both the systems relies on the difficulty of discrete logarithms over finite fields.

  8. 75 FR 39036 - Public Housing Assessment System (PHAS): Management Operations Certification

    Science.gov (United States)

    2010-07-07

    ... URBAN DEVELOPMENT Public Housing Assessment System (PHAS): Management Operations Certification AGENCY... of all major areas of a participant's management operations. The information is used to assess the...) submit management information for evaluation of all major areas of a participant's management...

  9. 78 FR 17389 - Texas Eastern Transmission, LP; Notice of Application for Certificate of Public Convenience and...

    Science.gov (United States)

    2013-03-21

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Texas Eastern Transmission, LP; Notice of Application for Certificate of Public Convenience and Necessity and Authorization for Abandonment Take notice that on February...

  10. Security Notions for Quantum Public-Key Cryptography

    CERN Document Server

    Koshiba, T

    2007-01-01

    It is well known that Shor's quantum algorithm for integer factorization can break down the RSA public-key cryptosystem, which is widely used in many cryptographic applications. Thus, public-key cryptosystems in the quantum computational setting are longed for cryptology. In order to define the security notions of public-key cryptosystems, we have to model the power of the sender, receiver, adversary and channel. While we may consider a setting where quantum computers are available only to adversaries, we generally discuss what are the right security notions for (quantum) public-key cryptosystems in the quantum computational setting. Moreover, we consider the security of quantum public-key cryptosystems known so far.

  11. Public Service In Service Soil Certificate In The Sorong City

    Directory of Open Access Journals (Sweden)

    Muhammad Ridha

    2015-03-01

    Full Text Available ABSTRACT One of the goals of decentralization in 2004 that the decentralization of Local Government authorities undergo a process of empowerment the ability of initiative creativity encouraged so that the capacity to address domestic problems getting stronger This opens opportunities made possible since the enactment and implementation of the Law on Local Government that Act No. 32 of 2004. The problem is formulated in this study is how the public service in the administration of land titles in Sorong city . This study used a qualitative approach that is descriptive analysis. This study seeks to describe and interpret what is can about the condition or existing relationship opinion growing ongoing process result or effect that occurs or emerging trend.Basic techniques of data collection used is interview observation and documentation. Interviews were used in the form of nonstandard or unstructured done without preparation of a list of questions that tight but based on the interview guide focused on research. Data analysis techniques in this study using a qualitative analysis of the interaction model proposed by Miles and Huberman. The results showed that public service obtaining certificates of land that occurred in Sorong city land office applied based counter system to provide services that are easy for the public applicants for all service activities through mechanisms that have been specified for ease of service. But it must be admitted that there are services that have not been fully optimized in accordance with the procedures of service. Counter parties in implementing the maintenance service is not in accordance with SOP according to the stages of eligibility has been determined. Service activities implemented by the land office by the applicant community feedback or service activities is not optimal because they are less efficient service activities tend to be economical because the service is not simple and not timely completion

  12. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... the value of the respective function on the internal state of the respective device (namely, on its secret share, internal randomness, and results of intermediate computations). We present distributed public key encryption (DPKE) and distributed identity based encryption (DIBE) schemes that are secure...

  13. Public-key cryptography based on bounded quantum reference frames

    OpenAIRE

    Ioannou, Lawrence M.; Mosca, Michele

    2009-01-01

    We demonstrate that the framework of bounded quantum reference frames has application to building quantum-public-key cryptographic protocols and proving their security. Thus, the framework we introduce can be seen as a public-key analogue of the framework of Bartlett et al. (Phys. Rev. A 70, 032307), where a private shared reference frame is shown to have cryptographic application. The protocol we present in this paper is an identification scheme, which, like a digital signature scheme, is a ...

  14. A Secure Public-key Image Authentication Plan

    Institute of Scientific and Technical Information of China (English)

    YANG Qing; CHEN Ke-fei

    2005-01-01

    Digital watermark can be used for image ownership verification or authentication. In this paper, we propose a new image authentication plan concentrating on its security performance. Digital watermark is first turbo coded, scaled and then processed in wavelet domain. To enhance security level, public key cryptosystem is utilized to replace traditional watermark key. Simulation results are finally given by experiment.

  15. A Survey of Key Technology of Network Public Opinion Analysis

    Directory of Open Access Journals (Sweden)

    Li Su Ying

    2016-01-01

    Full Text Available The internet has become an important base for internet users to make comments because of its interactivity and fast dissemination. The outbreak of internet public opinion has become a major risk for network information security. Domestic and foreign researchers had carried out extensive and in-depth study on public opinion. Fruitful results have achieved in the basic theory research and emergency handling and other aspects of public opinion. But research on the public opinion in China is still in the initial stage, the key technology of the public opinion analysis is still as a starting point for in-depth study and discussion.

  16. 49 CFR 30.13 - Restrictions on Federal public works projects: Certification.

    Science.gov (United States)

    2010-10-01

    ... WORKS CONTRACTS TO SUPPLIERS OF GOODS AND SERVICES OF COUNTRIES THAT DENY PROCUREMENT MARKET ACCESS TO U.S. CONTRACTORS § 30.13 Restrictions on Federal public works projects: Certification. As prescribed... 49 Transportation 1 2010-10-01 2010-10-01 false Restrictions on Federal public works...

  17. A public-key cryptosystem for quantum message transmission

    Science.gov (United States)

    Yang, Li

    2005-01-01

    We present a quantum public-key cryptography protocol for quantum message transmission. The private key of this protocol includes three classical matrices: a generator matrix of a Goppa code, an invertible matrix and a permutation matrix. The public key is product of these three matrices. The encryption and decryption algorithms are merely quantum computations related with the transformations between bases of the quantum registers. The security of this protocol is based on the hypothesis that there is no effective algorithm of NP-complete problem.

  18. LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

    CERN Document Server

    Toorani, Mohsen; 10.1109/ICCS.2008.4737164

    2010-01-01

    The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile environments. The traditional public key cryptography involves huge computational costs and is not so suitable for the resource-constrained platforms. The elliptic curve-based approaches as the newer solutions require certain considerations that are not taken into account in the traditional public key infrastructures. The main contribution of this paper is to introduce a Lightweight Public Key Infrastructure (LPKI) for the constrained platforms such as mobile phones. It takes advantages of elliptic curve cryptography and signcryption to decrease the computational costs and communication overheads, and adapting to the constraints. All the computational costs of required validations can be eliminated from end-entities by introduction of a validation authority to th...

  19. A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups

    CERN Document Server

    Gligoroski, Danilo; Knapskog, Svein Johan

    2008-01-01

    We have designed a new class of public key algorithms based on quasigroup string transformations using a specific class of quasigroups called multivariate quadratic quasigroups (MQQ). Our public key algorithm is a bijective mapping, it does not perform message expansions and can be used both for encryption and signatures. The public key consist of n quadratic polynomials with n variables where n=140, 160, ... . A particular characteristic of our public key algorithm is that it is very fast and highly parallelizable. More concretely, it has the speed of a typical modern symmetric block cipher - the reason for the phrase "A Public Key Block Cipher" in the title of this paper. Namely the reference C code for the 160-bit variant of the algorithm performs decryption in less than 11,000 cycles (on Intel Core 2 Duo -- using only one processor core), and around 6,000 cycles using two CPU cores and OpenMP 2.0 library. However, implemented in Xilinx Virtex-5 FPGA that is running on 249.4 MHz it achieves decryption thro...

  20. Modeling, Simulation and Analysis of Public Key Infrastructure

    Science.gov (United States)

    Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)

    1998-01-01

    Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.

  1. SPEED AND SECURITY ENHANCEMENT THROUGH PUBLIC KEY CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    J.SAIGEETHA

    2010-08-01

    Full Text Available It is true that the transfer of data is essential in the fast developing world. It is equally true that the transfer of data tobe taken place with much security by not giving groom to the intruders. This paper presents the analysis of the security of information with enhanced the speed of encryption and decryption process. This process uses public key cryptography via RSA algorithm with some modification. There are two keys used in RSA algorithm foreffectiveness in the aspect of security one being the public key used for all and the other being the secret key. The implementation is done in the JAVA language and crypt analysis is performed to check the level of protection and speed .

  2. Public Key Infrastructure Increment 2 (PKI Inc 2)

    Science.gov (United States)

    2016-03-01

    Public Key Infrastructure (PKI) is a critical enabling technology for Information Assurance (IA) services to support seamless secure information flows...resources. 6. Integrity of software used within or transmitted over DoD networks (i.e. mobile code,) and the provision of security services within the...Operational Capability IP - Internet Protocol IT - Information Technology KPP - Key Performance Parameter $M - Millions of Dollars MAIS - Major

  3. Certification

    Science.gov (United States)

    Hayhurst, Kelly

    2010-01-01

    Objective 1: Provide regulators with a methodology for development of airworthiness requirements for certification of UAS. a) Rationale: a comprehensive methodology does not currently exist to support development of regulation for certification of UAS. Regulation is essential to enable routine access to the NAS. b) Approach: 1) assess existing approaches and classification schemes for deriving acceptable means of compliance to airworthiness requirements. 2) investigate a service-based approach to classification of UAS. 3) conduct comparative analysis of different methodologies. 4) work with FAA to determine best approach and conduct case study. 5) participate in regulatory/standards organizations developing safety and performance requirements for UAS. Objective 2: Provide regulators and industry with hazard and risk-related data to support criteria for UAS type design. a) Rationale: There is presently little UAS specific data (incident, accident, and reliability), especially in a civil context, to support risk assessment and development of standards and regulation. b) Approach: Identify gaps in existing data, provide measured data as needed, and formulate recommendations by: 1) evaluating UAS incident/accident data collection efforts and determining additional support necessary for regulation. 2) assessing UAS-specific hazards and risks. 3) evaluating need for reliability data for UAS-unique systems, components and subsystem, and determining additional measurement requirements. 4) developing guidance and best practices for UAS type design.

  4. Public-key Encryption with Registered Keyword Search

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is

  5. Cryptanalysis on a finite automaton public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    戴大为; 吴逵; 张焕国

    1996-01-01

    An attack algorithm is proposed on a finite automaton public key cryptosystem.It is proved that this attack can break FAPKCO in polynomial time.The basic idea can be used in principle to attack other FAPKCs.Therefore,while designing an FAPKC,it must be taken into account whether it is secure or not under this kind of attack.

  6. Public Key Cryptography Based on Ergodic Matrices over Finite Field

    Institute of Scientific and Technical Information of China (English)

    PEI Shihui; ZHAO Hongwei; ZHAO Yongzhe

    2006-01-01

    A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can' be solved with polynomial time algorithm.

  7. 77 FR 68196 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-11-15

    ... Applications, or Motion to Modify Scope: November 13, 2012. Description: Application of Gama Charters Inc. (``Gama'') requesting a certificate of public convenience and necessity authorizing Gama to engage in the... (``BBJ''). Gama also requests the Department exercise its discretionary authority to issue Gama...

  8. Trellis-coded quantization for public-key steganography

    CERN Document Server

    Guelvouit, Gaëtan Le

    2008-01-01

    This paper deals with public-key steganography in the presence of a passive warden. The aim is to hide secret messages within cover-documents without making the warden suspicious, and without any preliminar secret key sharing. Whereas a practical attempt has been already done to provide a solution to this problem, it suffers of poor flexibility (since embedding and decoding steps highly depend on cover-signals statistics) and of little capacity compared to recent data hiding techniques. Using the same framework, this paper explores the use of trellis-coded quantization techniques (TCQ and turbo TCQ) to design a more efficient public-key scheme. Experiments on audio signals show great improvements considering Cachin's security criterion.

  9. Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

    Directory of Open Access Journals (Sweden)

    Rajesh P Singh

    2010-04-01

    Full Text Available In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Ourpublic key algorithm is bijective and can be used for both encryption and signatures

  10. A New Factorization Method to Factorize RSA Public Key Encryption

    Directory of Open Access Journals (Sweden)

    Bhagvant Ram Ambedkar

    2011-11-01

    Full Text Available The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm is based on positive integer N, because each transmitting node generates pair of keys such as public and private. Encryption and decryption of any message depends on N. Where, N is the product of two prime numbers and pair of key generation is dependent on these prime numbers. The factorization of N is very intricate. In this paper a New Factorization method is proposed to obtain the factor of positive integer N. The proposed work focuses on factorization of all trivial and nontrivial integer numbers and requires fewer steps for factorization process of RSA modulus N. The New Factorization method is based on Pollard rho factorization method. Experimental results shown that factorization speed is fast as compare existing methods.

  11. Efficient quantum secure communication with a publicly known key

    Institute of Scientific and Technical Information of China (English)

    Li Chun-Yan; Li Xi-Han; Deng Fu-Guo; Zhou Hong-Yu

    2008-01-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently.

  12. An application of different dioids in public key cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Durcheva, Mariana I., E-mail: mdurcheva66@gmail.com [Technical University of Sofia, Faculty of Applied Mathematics and Informatics, 8 Kliment Ohridski St., Sofia 1000 (Bulgaria)

    2014-11-18

    Dioids provide a natural framework for analyzing a broad class of discrete event dynamical systems such as the design and analysis of bus and railway timetables, scheduling of high-throughput industrial processes, solution of combinatorial optimization problems, the analysis and improvement of flow systems in communication networks. They have appeared in several branches of mathematics such as functional analysis, optimization, stochastic systems and dynamic programming, tropical geometry, fuzzy logic. In this paper we show how to involve dioids in public key cryptography. The main goal is to create key – exchange protocols based on dioids. Additionally the digital signature scheme is presented.

  13. New Public Key Cryptosystems from Combinatorial Group Theory

    Institute of Scientific and Technical Information of China (English)

    TANG Xueming; WANG Xiaofei; HONG Fan; CUI Guohua

    2006-01-01

    External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in the quantum computing epoch. Three hard problems on this new platform, Subgroup Root Problem, Multi-variant Subgroup Root Problem and Subgroup Action Problem are presented and well analyzed, which all have no relations with conjugacy. New secure public key encryption system and key agreement protocol are designed based on these hard problems. The new cryptosystems can be implemented in a general group environment other than in braid or Artin groups.

  14. HALAL CERTIFICATION SYSTEM AS A KEY DETERMINANT OF FIRM INTERNATIONALISATION IN THE PHILIPPINES AND MALAYSIA

    National Research Council Canada - National Science Library

    François N Dubé; Yang HaiJuan; Huang Lijun

    2016-01-01

    [...]halal certification has been widely recognised as a core factor in the international expansion of halal food firms by many authors (Bohari, Cheng, & Nurwahida, 2013; Borzooei & Asgari, 2013; Hadju, 2011; Hussain, 2009...

  15. Key-phrase based classification of public health web pages.

    Science.gov (United States)

    Dolamic, Ljiljana; Boyer, Célia

    2013-01-01

    This paper describes and evaluates the public health web pages classification model based on key phrase extraction and matching. Easily extendible both in terms of new classes as well as the new language this method proves to be a good solution for text classification faced with the total lack of training data. To evaluate the proposed solution we have used a small collection of public health related web pages created by a double blind manual classification. Our experiments have shown that by choosing the adequate threshold value the desired value for either precision or recall can be achieved.

  16. Secure Internet Voting System based on Public Key Kerberos

    Directory of Open Access Journals (Sweden)

    Hussein Khalid Abd-Alrazzq

    2012-03-01

    Full Text Available Electronic voting system is an important tool which allows voters to vote over the Internet without the geographical restrictions with considers important criteria in evaluating electronic voting schemes such as the mobility, democracy, and privacy. In this paper secure remote voting system has been presented. The proposed system uses public key Kerberos which is another form of traditional Kerberos as infrastructure deal with voters. The public key is used in all steps of Kerberos (not only in initial. The proposed system utilizes the advantages of threshold cryptography to prevent anyone to decrypt or sign the ballot alone without agreement all authorities, and use threshold blind signature to prevent discovers the vote or the identity of voter and protect the content of the ballot during casting and provide verifiable and discourages ballot buying.

  17. Review of Lattice-based Public key Cryptography(Russian)

    OpenAIRE

    Usatyuk, V. S.

    2010-01-01

    This article presets a review of the achievements rapidly developing field of cryptography - public-key cryptography based on the lattice theory. Paper contains the necessary basic concepts and the major problems of the lattice theory, as well as together with the description on the benefits of this cryptography class - the properties of the reliability to quantum computers and full homomorphism, the shortcomings of specific implementations.

  18. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-09-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  19. "I Want More": Does a Divide between Charter and Public School Teachers Cause Different Desires for Certification Programs?

    Science.gov (United States)

    Maloney, Patricia; McKenzie-Thompson, Kenann

    2013-01-01

    The number of teachers entering the profession through alternative certification and the number of charter schools in the United States have increased over the past twenty years. While there is a great deal of research on the efficacy of different paths to certification on teachers in public schools, there is little research exploring the needs of…

  20. Quality certification as a key success factor in international marketing of food products

    DEFF Research Database (Denmark)

    Jørgensen, Niels; Marcussen, Carl Henrik

    1996-01-01

    retail chains, catering firms and food processing companies have been interviewed about their criteria for choosing suppliers and what part the quality management systems of the suppliers and perhaps an ISO certification would play in this connection. 4. It appears from the investigation that in general......Executive summary 1. During recent years Danish producers of processed pork have experienced an increasing competition in the Western European markets. In this connection it has been maintained that a better quality and especially an ISO 9000 certification of the quality management systems...... of the companies could be an effective means by which to compete more successfully. 2. An ISO 9000 certification means that the supplying company keeps its promises, which could be an advantage for the various customers. For instance they would be able to reduce their own control costs and simplify the procedures...

  1. Quality certification as a key success factor in international marketing of food products

    DEFF Research Database (Denmark)

    Jørgensen, Niels; Marcussen, Carl Henrik

    1996-01-01

    Executive summary 1. During recent years Danish producers of processed pork have experienced an increasing competition in the Western European markets. In this connection it has been maintained that a better quality and especially an ISO 9000 certification of the quality management systems of the...... certified and others will even make a certification a future demand, the general recommendation of this paper would be that Danish suppliers of processed meat should become ISO 9000 certified as soon as possible....... for choosing suppliers. For this reason it is investigated in this paper whether an ISO 9000 certification would have a preference sha effect with the customers of Danish food suppliers or not. 3. The investigation has taken place in Sweden, Germany and Great Britain. A number of decision makers in major...

  2. A model for revocation forecasting in public-key infrastructures

    OpenAIRE

    Hernández Gañan, Carlos; Mata Diaz, Jorge; Muñoz Tapia, José Luis; Esparza Martín, Óscar; Alins Delgado, Juan José

    2015-01-01

    One of the hardest tasks of a certification infrastructure is to manage revocation. This process consists in collecting and making the revocation status of certificates available to users. Research on this topic has focused on the trade-offs that different revocation mechanisms offer. Much less effort has been conducted to understand and model real-world revocation processes. For this reason, in this paper, we present a novel analysis of real-world collected revocation data and we propose a r...

  3. Lower and Upper Bounds for Deniable Public-Key Encryption

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian

    2011-01-01

    the parties to change their internal state to make it look like a given ciphertext decrypts to a message different from what it really decrypts to. Deniable encryption was in this way introduced to allow to deny a message exchange and hence combat coercion. Depending on which parties can be coerced......, the security level, the flavor and the number of rounds of the cryptosystem, it is possible to define a number of notions of deniable encryption. In this paper we prove that there does not exist any non-interactive receiver-deniable cryptosystem with better than polynomial security. This also shows...... that it is impossible to construct a non-interactive bi-deniable public-key encryption scheme with better than polynomial security. Specifically, we give an explicit bound relating the security of the scheme to how efficient the scheme is in terms of key size. Our impossibility result establishes a lower bound...

  4. Error-correcting pairs for a public-key cryptosystem

    Science.gov (United States)

    Pellikaan, Ruud; Márquez-Corbella, Irene

    2017-06-01

    Code-based Cryptography (CBC) is a powerful and promising alternative for quantum resistant cryptography. Indeed, together with lattice-based cryptography, multivariate cryptography and hash-based cryptography are the principal available techniques for post-quantum cryptography. CBC was first introduced by McEliece where he designed one of the most efficient Public-Key encryption schemes with exceptionally strong security guarantees and other desirable properties that still resist to attacks based on Quantum Fourier Transform and Amplitude Amplification. The original proposal, which remains unbroken, was based on binary Goppa codes. Later, several families of codes have been proposed in order to reduce the key size. Some of these alternatives have already been broken. One of the main requirements of a code-based cryptosystem is having high performance t-bounded decoding algorithms which is achieved in the case the code has a t-error-correcting pair (ECP). Indeed, those McEliece schemes that use GRS codes, BCH, Goppa and algebraic geometry codes are in fact using an error-correcting pair as a secret key. That is, the security of these Public-Key Cryptosystems is not only based on the inherent intractability of bounded distance decoding but also on the assumption that it is difficult to retrieve efficiently an error-correcting pair. In this paper, the class of codes with a t-ECP is proposed for the McEliece cryptosystem. Moreover, we study the hardness of distinguishing arbitrary codes from those having a t-error correcting pair.

  5. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Science.gov (United States)

    2010-04-19

    ... From the Federal Register Online via the Government Publishing Office GENERAL SERVICES ADMINISTRATION Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property..., identified as Key Largo Beacon Annex Site, Key Largo, FL to the U.S. Fish and Wildlife Service, Department...

  6. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  7. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  8. 76 FR 32010 - Certifications Pursuant to Public Law That 12 Nations Have Adopted Programs To Reduce the...

    Science.gov (United States)

    2011-06-02

    ... Certifications Pursuant to Public Law That 12 Nations Have Adopted Programs To Reduce the Incidental Capture of..., pursuant to Section 609 of Public Law 101-162, that 12 nations have adopted programs to reduce the... 609 of Public Law 101-162 (``Section 609'') prohibits imports of certain categories of shrimp...

  9. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Md. Sarwar Morshed

    2010-01-01

    Full Text Available The Session Initiation Protocol (SIP has become the most predominant protocol for Voice over Internet Protocol (VoIP signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF. Finally we analyze the security aspects of these approaches.

  10. Towards Public Key Infrastructure less authentication in Session Initiation Protocol

    CERN Document Server

    Hasib, Abdullah Al; Morshed, Md Sarwar

    2010-01-01

    The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions to Public Key Infrastructure (PKI) based solution. However, due to the limitations in PKI based solutions, some PKI less authentications mechanisms are proposed. This paper aims to present an overview of different authentication methods used in or together with SIP. We start by highlighting the security issues in SIP in the context of VoIP communication. Then we illustrate the current activities regarding the SIP authentication mechanisms including the recent developments in the research community and standardization efforts within the Internet Engineering Task Force (IETF). Finally we analyze the security aspects of these approaches.

  11. 78 FR 1299 - Waiver and Certification of Statutory Provisions of Section 1003 of Public Law 100-204 Regarding...

    Science.gov (United States)

    2013-01-08

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Waiver and Certification of Statutory Provisions of Section 1003 of Public Law 100-204 Regarding the... 1987, Public Law 100-204, Title X. (U) This waiver shall be effective for a period of six months....

  12. Virtual microscopy and public-key cryptography for Internet telepathology.

    Science.gov (United States)

    Strauss, J S; Felten, C L; Okada, D H; Marchevsky, A M

    1999-01-01

    The Internet is a potentially inexpensive, widely available medium for telepathology, but there are concerns about its reliability and security. Using a digital camera, 41 photomicrographs of transbronchial biopsies, at x 100 optical magnification, were captured and digitized at 2700 x 3400 pixel, 24 bit/pixel resolution. The image files were saved in JPEG format at medium compression, attached to text files with patient information, encrypted for security in the S/MIME format using a digital signature and digital envelope, and transmitted by email. Received email files were decrypted automatically and the images viewed with standard software. Telepathology diagnoses were compared with original interpretations. The images averaged 810 kByte in size. The encryption and decryption did not cause significant delays in overall transmission time and, together with transmission, did not produce noticeable image degradation. The received image files could be viewed in a manner that simulated light microscopy. There was agreement between telepathology and original diagnoses in 92% of the cases. All the discrepancies were due to inadequate area selection because the pathological features of interest were present in histological levels other than those photographed. The use of high-resolution digital photomicrography, the Internet and public-key cryptography offers an effective and relatively inexpensive method of telepathology consultation. The method is best suited for the diagnosis of small biopsy specimens that require the transmission of only a few digital images that represent the majority of the biopsy materials.

  13. A PROPOSAL FOR CONSTRUCTING A BOND INDEX ON TURKISH PUBLIC LEASE CERTIFICATES

    OpenAIRE

    Okumus, Sinan

    2017-01-01

    Lease certificate market ha been growing on both government and private sector front in Turkey. Lease certificates are issued as asset based and they distribute rental income as opposed to conventional bonds paying interest to its investors. Investors of the lease certificates face with liquidity risk and high transaction costs due to large bid and ask spreads. Investing in Turkish lease certificates through Exchange Traded Fund can improve the lease certificate market and thus helps increasi...

  14. Political Economy of the Public Forest Certification in the Gunungkidul Regency, DIY Province

    Directory of Open Access Journals (Sweden)

    Sulistyaningsih

    2013-02-01

    Full Text Available Public forests, particularly the ones in Java island, were developed in the 1930s by Dutch colonial government although the government’s policy did not fully recognize and legitimate them as state forests. Nevertheless, the contribution of the forests to local communities cannot be denied, because the existence of community forest can be lifesaving. That public forest after deforestation becomes an alternative solution can be seen in changes in the timber industry, in that demand for wood is increasing. The change resulted could be seen in the cultural change of this industry on the management of public forest in Java, especially in Gunungkidul Yogyakarta. The demand and pressure of international market that set requirements on the wood sold to be of high quality and accompanied with legal documents of public forets is an absolute condition to have the logs be accepted, recognized and marketed in international market. In political economical context, forest certification in Gunungkidul regency needs the intervention of the State to protect the marketing of timber from public forests.

  15. Bit-oriented quantum public-key encryption based on quantum perfect encryption

    Science.gov (United States)

    Wu, Chenmiao; Yang, Li

    2016-08-01

    A bit-oriented quantum public-key encryption scheme is presented. We use Boolean functions as private-key and randomly changed pairs of quantum state and classical string as public-keys. Following the concept of quantum perfect encryption, we prepare the public-key with Hadamard transformation and Pauli transformation. The quantum part of public-keys is various with different classical strings. In contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys. We investigate attack to the private-key and prove that the public-key is a totally mixed state. So the adversary cannot acquire any information about private-key from measurement of the public-key. Then, the attack to encryption is analyzed. Since the trace distance between two different ciphertexts is zero, the adversary cannot distinguish between the two ciphertext states and also obtains nothing about plaintext and private-key. Thus, we have the conclusion that the proposed scheme is information-theoretically secure under an attack of the private-key and encryption.

  16. Argumentation Key to Communicating Climate Change to the Public

    Science.gov (United States)

    Bleicher, R. E.; Lambert, J. L.

    2012-12-01

    Argumentation plays an important role in how we communicate climate change science to the public and is a key component integrated throughout the Next Generation Science Standards. A scientific argument can be described as a disagreement between explanations with data being used to justify each position. Argumentation is social process where two or more individuals construct and critique arguments (Kuhn & Udell, 2003; Nussbaum, 1997). Sampson, Grooms, and Walker's (2011) developed a framework for understanding the components of a scientific argument. The three components start with a claim (a conjecture, conclusion, explanation, or an answer to a research question). This claim must fit the evidence (observations that show trends over time, relationships between variables or difference between groups). The evidence must be justified with reasoning (explains how the evidence supports the explanation and whey it should count as support). In a scientific argument, or debate, the controversy focuses on how data were collected, what data can or should be included, and what inferences can be made based on a set of evidence. Toulmin's model (1969) also includes rebutting or presenting an alternative explanation supported by counter evidence and reasoning of why the alternative is not the appropriate explanation for the question of the problem. The process of scientific argumentation should involve the construction and critique of scientific arguments, one that involves the consideration of alternative hypotheses (Lawson, 2003). Scientific literacy depends as much on the ability to refute and recognize poor scientific arguments as much as it does on the ability to present an effective argument based on good scientific data (Osborne, 2010). Argument is, therefore, a core feature of science. When students learn to construct a sound scientific argument, they demonstrate critical thinking and a mastery of the science being taught. To present a convincing argument in support of

  17. Public engagement with CCS: barriers, key issues and ways forward

    Science.gov (United States)

    Xenias, Dimitrios

    2017-04-01

    Although Carbon Capture and Storage (CCS) is recognised as a crucial transition technology to a low-carbon world, it has not been popular with the public or some governments (e.g. the UK). Also, despite its use in industrial processes for decades, CCS remains and unfamiliar technology for most publics. It is therefore important to foster top-down and bottom-up acceptance of large scale CCS. In an exploratory round of interviews we canvassed the views of British, Dutch, German and Norwegian experts (N=13) with previous experience in public engagement with CCS. They identified barriers and drivers for CCS deployment and public engagement with CCS. Thematic analysis revealed a small number of recurrent issues, including: (a) lack of political leadership on CCS; (b) lack of public knowledge on relevant technologies and (c) difficulty communicating why CCS is necessary. Emphasis on these barriers varied with the level of experts' engagement with the public. More interestingly, although most experts agreed on the importance of public engagement, their views divided between 'why' engage and 'how' best to do this. In a subsequent expert survey (N=99) interview findings were reinforced: public support was seen as important for CCS roll-out (72%), though lower than political support and funding. The survey also showed that local public was expected to experience most risks, while global public will experience most benefits; whereas local business is seen to benefit more than global. Experts were overwhelmingly positive about CCS - risks outweigh benefits, and are confident that CCS will play a major role in climate change mitigation (along with reduced energy demand and renewables). These findings will be expanded on and triangulated in a follow-up public survey which will benefit those involved with public engagement with CCS.

  18. A brief review of revocable ID-based public key cryptosystem

    Directory of Open Access Journals (Sweden)

    Tsu-Yang Wu

    2016-03-01

    Full Text Available The design of ID-based cryptography has received much attention from researchers. However, how to revoke the misbehaviour/compromised user in ID-based public key cryptosystem becomes an important research issue. Recently, Tseng and Tsai proposed a novel public key cryptosystem called revocable ID-based public key cryptosystem (RIBE to solve the revocation problem. Later on, numerous research papers based on the Tseng-Tsai key RIBE were proposed. In this paper, we brief review Tseng and Tsai's RIBE. We hope this review can help the readers to understand the Tseng and Tsai's revocable ID-based public key cryptosystem.

  19. 7 CFR Appendix D to Subpart B of... - Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to 7 CFR 1744.30 D Appendix D to Subpart B of Part 1744...—Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to 7 CFR...

  20. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  1. Quantum key management

    Science.gov (United States)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  2. A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key

    Institute of Scientific and Technical Information of China (English)

    LI Ji-guo; ZHANG Yi-chen; ZHU Yue-long

    2005-01-01

    A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, and forgery attacks. The proposed scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, the proposed scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signature signer.

  3. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  4. Key Performance Indicators of Public Universities Based on Quality Assessment Criteria in Thailand

    Science.gov (United States)

    Sukboonyasatit, Kritsana; Thanapaisarn, Chaiwit; Manmar, Lampang

    2011-01-01

    The research objective was to develop public universities' key performance indicators. Qualitative research and interviews were employed with each public university's senior executive and quality assessors. The sample group was selected by the office of the public sector development commission and Thailand's public universities can be separated…

  5. Public Participation: Do's and Don't's & Key Messages

    NARCIS (Netherlands)

    Astley, T.; Massey, H.

    2005-01-01

    This document has been produced to provide a tool to project managers to enable them to quickly assess whether or not participation is the right thing to do and the key Dos and Donts of participation. An example of a Community Engagement Plan in the UK is discribed.

  6. Writing for Professional Publication. Keys to Academic and Business Success.

    Science.gov (United States)

    Henson, Kenneth T.

    This book provides practical help for people writing for publication, especially for those writing for professional journals or university presses. Chapters cover the following topics: (1) reasons for writing; (2) finding topics; (3) getting started; (4) writing style; (5) organizing articles; (6) using journals, libraries, surveys, and action…

  7. Digital Certificate of Mobile Banking Service Based on Headset Key%基于耳机key的手机银行数字证书应用研究

    Institute of Scientific and Technical Information of China (English)

    王健; 彭新光

    2013-01-01

    In this paper,a novel solution for digital certificate of mobile banking service is introduced based on headset key.At first,the research and engineering status of digital certificate of mobile banking service is surveyed.Then,the principle and superiority of headset key are introduced.Finally,the digital certification solution of mobile banking service based on headset key is presented.The digital certification solution is more secure and convenient than conventional methods.%提出了一种基于耳机key的手机银行数字证书方案.首先对手机银行数字证书在应用和科研领域的现状进行了总结,接着说明了手机耳机key的技术原理和优势,最后给出了基于手机耳机key的手机银行中数字证书的应用方案.与传统方法相比,本文的方案具备非常好的安全性和便捷性.

  8. Improved RSA cryptosystem based on the study of number theory and public key cryptosystems

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-01-01

    Full Text Available Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which form a key pair are used. One key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first key used for encryption. In this paper, we have proposed an improved approach of RSA algorithm using two public key pairs and using some mathematical logic rather than sending one public key d irectly.Because if an attacker has an opportunity of getting the public key componet they can find private key value by brute force search. General Terms: Cryptography, network security

  9. 一种基于PKI的密钥%An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs).Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services.In this paper, we concentrate on the properties of the protocol of Phase 1 IKE.After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI.Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol.The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  10. Expectations of residents and tourists of agriculture-related certification systems: analysis of public perceptions

    Directory of Open Access Journals (Sweden)

    Yuta Uchiyama

    2017-06-01

    Conclusion: It is necessary to evaluate the GIAHS's contribution to tourism and industry when municipalities and international organizations manage the GIAHS sites. Considering the gaps between residents and tourists and taking measures to resolve them can contribute to managing certificated areas by collaboration of stakeholders. Regarding products aimed at branding, consumers need to be informed about the GIAHS as a regional certification in addition to product certification to share the historical and environmental characteristics of agricultural products.

  11. Key elements for a measurement framework for public sector innovation

    DEFF Research Database (Denmark)

    Bloch, Carter Walter; Lopez-Bassols, Vladimir

    2013-01-01

    This document provides an overview of recent NESTI work on developing guidelines for measuring public sector innovation (PSI). The paper includes an update on various ongoing activities which will contribute to the development of a measurement framework for PSI and outlines a number of areas which...... could be further addressed in a final report. Delegates are invited to discuss the proposals and provide inputs on the next steps of the work, particularly regarding the use of multiple approaches, the scope of the measurement framework, the need for core definitions,and priorities for indicators...

  12. Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2011-01-01

    In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext

  13. Public key encryption supporting plaintext equality test and user-specified authorization

    NARCIS (Netherlands)

    Tang, Qiang

    2012-01-01

    In this paper, we investigate a category of public key encryption schemes that supports plaintext equality test and userspecified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a proxy to authorize it to perform plaintext

  14. PKI Interoperability Based on Online Certificate Validation

    Directory of Open Access Journals (Sweden)

    Dinu Smadu

    2011-03-01

    Full Text Available One of the most important problems related to Public Key Infrastructures is the validation of the digital certificates. Certificate validation services can be based on offline and/or online schemes. Offline schemes have the major disadvantage that they cannot always give an up-to-date response. On the other side, the most used protocol for online validation, the Online Certificate Status Protocol [1], also has its drawbacks. It can only state if a certificate has been revoked or not. RFC 5055 [2] defines a more complex protocol, the Server-based Certificate Validation Protocol (SCVP, capable of building and validating the certification path. To implement a basic functionality of this new protocol, we will start from an existing project, the CADDISK and we will try to implement an OpenSSL module.

  15. Trusted Certificates in Quantum Cryptography

    OpenAIRE

    Perkins, William

    2006-01-01

    This paper analyzes the performance of Kak's three stage quantum cryptographic protocol based on public key cryptography against a man-in-the-middle attack. A method for protecting against such an attack is presented using certificates distributed by a trusted third party.

  16. Sustainability as the key to prioritize investments in public infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Pardo-Bosch, Francesc, E-mail: francesc.pardo@upc.edu [Departament d' Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya - Barcelona Tech. (Spain); Political Science Department, University of California - Berkeley (United States); Aguado, Antonio, E-mail: antonio.aguado@upc.edu [Departament d' Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya - Barcelona Tech. (Spain)

    2016-09-15

    Infrastructure construction, one of the biggest driving forces of the economy nowadays, requires a huge analysis and clear transparency to decide what projects have to be executed with the few resources available. With the aim to provide the public administrations a tool with which they can make their decisions easier, the Sustainability Index of Infrastructure Projects (SIIP) has been defined, with a multi-criteria decision system called MIVES, in order to classify non-uniform investments. This index evaluates, in two inseparable stages, the contribution to the sustainable development of each infrastructure project, analyzing its social, environmental and economic impact. The result of the SIIP allows to decide the order with which projects will be prioritized. The case of study developed proves the adaptability and utility of this tool for the ordinary budget management.

  17. Applications of single-qubit rotations in quantum public-key cryptography

    OpenAIRE

    Nikolopoulos, Georgios M.

    2008-01-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum stat...

  18. NBPTS-Parallel Certification and Its Impact on the Public Schools: A Qualitative Approach.

    Science.gov (United States)

    Williams, Bonnie; Bearer, Kathy

    This study examined whether National Board for Professional Teaching Standards (NBPTS) certification would impact school districts' educational processes, identifying areas in which NBPTS certification impacted such factors as: classroom teaching practices; professional development; employment procedures and opportunities; teachers' career paths;…

  19. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud.

    Science.gov (United States)

    Munisamy, Shyamala Devi; Chokkalingam, Arun

    2015-01-01

    Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  20. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud

    Directory of Open Access Journals (Sweden)

    Shyamala Devi Munisamy

    2015-01-01

    Full Text Available Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider’s premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  1. Quality certification of the medical information systems - An overview -

    Directory of Open Access Journals (Sweden)

    Simona Apostol

    2010-01-01

    Full Text Available Resistance to change is something specifically human, being an easy thing to understand, but it has to be overcome now, and not as it happens, after generations. The certification process currently exists in many areas. Certification may be organized under different legal frameworks, it can be ensured by involving different types of organizations, public and private, but the common element remains the recognition of the key role it plays in the process of certification of quality assurance.

  2. Trust Based Certificate Revocation for Secure Routing in MANET

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2016-01-01

    Many trust establishment solutions in mobile ad hoc networks (MANETs) rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation. In order to reduce the hazards from nodes and to enhance the security of network we pro...

  3. Breaking the HFEM public key scheme%破解HFEM公钥密码方案

    Institute of Scientific and Technical Information of China (English)

    古春生

    2013-01-01

    To design post-quantum public key cryptography, Zhao, et al presented a novel public key scheme based on the BMQ problem. An equivalent secret key could directly be solved from the public key of their scheme by applying the property of the ergodic matrix over finite field. Thus, the HFEM public key scheme was broken.%  为设计后量子公钥密码,赵永哲等人提出了一种基于BMQ问题新的公钥方案。利用有限域上遍历矩阵的性质,从该方案公钥能够直接求出其等价私钥,从而破解了该HFEM公钥密码方案。

  4. Fast public-key encryption scheme based on Chinese remainder theorem

    Institute of Scientific and Technical Information of China (English)

    Baocang WANG; Yongzhuang WEI; Yupu HU

    2009-01-01

    Traditional public-key cryptosystems suffer from a relatively low encryption/decryption speed, which hampers their applications in resource-constrained environments. A fast public-key cryptosystem is proposed to remedy this drawback. The new algorithm uses Chinese remainder theorem to hide the trapdoor information. The encryption of the system only carries out several modular multiplication operations, and the decryption only needs a modular multiplication and a low-dimensional matrixvector multiplication, which makes the speed of the encryption and the decryption of the scheme very high.The security of the system is based on two difficult number-theoretic problems. The attacker has to solve the integer factorization problem and the simultaneous Diophantine approximation problem simultaneously to recover the secret key from the public key. The proposed cryptosystem is also shown to be secure against lattice attack. The analysis shows that the encryption algorithm is a secure, fast and efficient public-key cryptosystem.

  5. A New Efficient Certificate-Based Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yichen; LI Jiguo; WANG Zhiwei; YAO Wei

    2015-01-01

    Certificate-based cryptography is a new kind of public key algorithm, which combines the merits of traditional Public key infrastructure (PKI) and identity-based cryptography. It removes the inherent key escrow problem in the identity-based cryptography and eliminates the certificate revocation problem and third-party queries in the traditional PKI. In this paper, we propose an effi-cient certificate-based signature scheme based on bilinear pairings. Under the strong security model of certificate-based signature scheme, we prove that our scheme is exis-tentially unforgeable against adaptive chosen message and identity attacks in the random oracle. In our scheme, only two pairing operations are needed in the signing and ver-ification processes. Compared with some certificate-based signature schemes from bilinear pairings, our scheme en-joys more advantage in computational cost and communi-cational cost.

  6. Measuring Public Leadership: Developing Scales for Four Key Public Leadership Roles

    NARCIS (Netherlands)

    Tummers, Lars; Knies, Eva|info:eu-repo/dai/nl/313875421

    2016-01-01

    This article on public leadership contributes to the literature by (1) focusing on the ‘public’ aspect of leadership and (2) developing quantitative scales for measuring four public leadership roles. These roles all refer to the extent to which public leaders actively support their employees in

  7. Measuring Public Leadership: Developing Scales for Four Key Public Leadership Roles

    NARCIS (Netherlands)

    Tummers, Lars; Knies, Eva

    2016-01-01

    This article on public leadership contributes to the literature by (1) focusing on the ‘public’ aspect of leadership and (2) developing quantitative scales for measuring four public leadership roles. These roles all refer to the extent to which public leaders actively support their employees in deal

  8. Data publication and dissemination of interactive keys under the open access model

    Directory of Open Access Journals (Sweden)

    Lyubomir Penev

    2009-09-01

    Full Text Available The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271. The present model is based on previous experience with several existing examples of publishing online keys. However, this model also suggests ways to publish, cite, preserve, disseminate and reuse the original data files to the benefit of the authors, future workers, and society in general. To be regarded as a ''formal scientific publication,'' an online key should satisfy the same criteria of peer review, registration, persistence, bibliographic description, etc., as conventional publications. Keys can be published in a form of either ''static'\\''dynamic'' publications. We define a ''static'' publication as a discrete unit of information preserved in a persistent and unchangeable way on the publisher’s Web site and/or on paper and consequently in conventional/electronic libraries and archives. This contrasts with the nature of the Internet, which allows and tends to encourage updating and improvement on a continuing basis. We call ''dynamic'' a publication of an interactive key on a Web site where its contents can be continuously updated. ''Dynamic'' publications meet some of the criteria of a ''formal scientific publication'' (identification, citation and location, while they lack other important features of it (persistence, archiving, indexing, science metric and citation metric services. Dynamic Web-based interactive keys may benefit from publishing the first version of their underlying datasets in a form of “formal scientific publication”. We define here the minimum set of data files to be published for several different platforms (Intkey, Lucid2, Lucid3, MX to ensure both (1 priority, identification, location and citation of the firstly published work and (2 future use and re-use of the keys.

  9. 7 CFR 1901.507 - Certificates of beneficial ownership issued by the FmHA or its successor agency under Public Law...

    Science.gov (United States)

    2010-01-01

    ...HA or its successor agency under Public Law 103-354 Finance Office. 1901.507 Section 1901.507... Certificates of beneficial ownership issued by the FmHA or its successor agency under Public Law 103-354... its successor agency under Public Law 103-354, by a certified check or bank draft payable to...

  10. A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys

    CERN Document Server

    Ioannou, Lawrence M

    2011-01-01

    We give new arguments in support of \\emph{signed quantum key establishment}, where quantum cryptography is used in a public-key infrastructure that provides the required authentication. We also analyze more thoroughly than previous works the benefits that quantum key establishment protocols have over certain classical protocols, motivated in part by the various objections to quantum key establishment that are sometimes raised. Previous knowledge of quantum cryptography on the reader's part is not required for this article, as the definition of "quantum key establishment" that we use is an entirely classical and black-box characterization (one need only trust that protocols satisfying the definition exist).

  11. Security of public key encryption technique based on multiple chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Wang Kai [Department of Radio Engineering, Southeast University, Nanjing 210096 (China)]. E-mail: kaiwang@seu.edu.cn; Pei Wenjiang [Department of Radio Engineering, Southeast University, Nanjing 210096 (China); Zou Liuhua [Department of Radio Engineering, Southeast University, Nanjing 210096 (China); Cheung Yiuming [Department of Computer Science, Hong Kong Baptist University, Hong Kong (China); He Zhenya [Department of Radio Engineering, Southeast University, Nanjing 210096 (China)

    2006-12-25

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP){sup m}, where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications.

  12. Data publication and dissemination of interactive keys under the open access model

    Science.gov (United States)

    The concepts of publication, citation and dissemination of interactive keys and other online keys are discussed and illustrated by a sample paper published in the present issue (doi: 10.3897/zookeys.21.271). The present model is based on previous experience with several existing examples of publishi...

  13. Health on Course? Key Messages from the 2002 Dutch Public Health Status and Forecasts Report

    NARCIS (Netherlands)

    Oers JAM van; VTV

    2003-01-01

    The third Dutch Public Health Status and Forecasts (PHSF) report once again contains a large amount of up-todate information about Dutch public health status, prevention and healthcare and includes international and regional comparisons. This brochure contains the Key Messages of the 2002 PHSF summa

  14. 2008 Key Student Outcomes Indicators for BC Diploma, Associate Degree, and Certificate Programs: Survey Results by Institution

    Science.gov (United States)

    Ministry of Advanced Education and Labour Market Development, 2009

    2009-01-01

    The BC Diploma, Associate Degree, and Certificate Student Outcomes (DACSO) Survey (formerly the BC College and Institute Student Outcomes Survey) collects and disseminates information about former students' post-secondary experiences and their subsequent labour market and further education experiences. The survey is administered annually to former…

  15. 2008 Key Student Outcomes Indicators for BC Diploma, Associate Degree, and Certificate Programs: Survey Results by Institution

    Science.gov (United States)

    Ministry of Advanced Education and Labour Market Development, 2009

    2009-01-01

    The BC Diploma, Associate Degree, and Certificate Student Outcomes (DACSO) Survey (formerly the BC College and Institute Student Outcomes Survey) collects and disseminates information about former students' post-secondary experiences and their subsequent labour market and further education experiences. The survey is administered annually to former…

  16. Applications of single-qubit rotations in quantum public-key cryptography

    Science.gov (United States)

    Nikolopoulos, Georgios M.

    2008-03-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum states of a qubit and its inversion can be infeasible by virtue of the Holevo’s theorem.

  17. 78 FR 66670 - Housing Counseling Program: New Certification Requirements; Extension of Public Comment Period

    Science.gov (United States)

    2013-11-06

    ... URBAN DEVELOPMENT 24 CFR Part 214 Housing Counseling Program: New Certification Requirements; Extension... Housing Counseling Program regulations for the purpose of implementing the Dodd-Frank Wall Street Reform and Consumer Protection Act amendments to the housing counseling statute. This document announces...

  18. Reducing Communication Overhead For Authentication Using Self Contained Public Key Management Scheme In MANET

    Directory of Open Access Journals (Sweden)

    Gundala Swathi

    2013-06-01

    Full Text Available In the past few years, we have seen a rapid increase in important application fields of Mobile ad-hoc networks (MANET. Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large scale depends on whether we can provide proper dependability. Particularly, security is the most important issue in MANET because of the limitation in resources. Management of keys is the most necessary activity for providing security for the network. MANETs have resource limitations. Thus using public-key based solutions is not feasible. Thus, we use symmetric key establishment. In this paper, a key management scheme which is self contained and public is represented.This scheme achieves near zero communication overhead while providing security services. Cryptographic keys in small numbers are inputted at all nodes prior to the deployment in network. Mathematical Combinations of pairs of keys, both public and private is used for better utilization of storage space. This means a combination of more than one key pair is utilized by nodes for the encryption and the decryption of messages. A secure communication algorithm for forwarding the packets in MANET is also proposed.

  19. Symmetries and security of a quantum-public-key encryption based on single-qubit rotations

    CERN Document Server

    Seyfarth, U; Alber, G

    2012-01-01

    Exploring the symmetries underlying a previously proposed encryption scheme which relies on single-qubit rotations, we derive an improved upper bound on the maximum information that an eavesdropper might extract from all the available copies of the public key. Subsequently, the robustness of the scheme is investigated in the context of attacks that address each public-key qubit independently. The attacks under consideration make use of projective measurements on single qubits and their efficiency is compared to attacks that address many qubits collectively and require complicated quantum operations.

  20. A General Construction of IND-CCA2 Secure Public Key Encryption

    DEFF Research Database (Denmark)

    Kiltz, Eike; Malone-Lee, John

    2003-01-01

    We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction.......We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction....

  1. A General Construction of IND-CCA2 Secure Public Key Encryption

    DEFF Research Database (Denmark)

    Kiltz, Eike; Malone-Lee, John

    2003-01-01

    We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction.......We propose a general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model. We show that the scheme proposed in [1, 2] fits our general framework and moreover that our method of analysis leads to a more efficient security reduction....

  2. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-01

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  3. The Design, Analysis and Optimization of the REESSE1+ Public-key Cryptosystem

    CERN Document Server

    Su, Shenghui

    2007-01-01

    This paper gives the definition of a coprime sequence and the concept of the lever function, describes the five algorithms and six characteristics of the REESSE1+ public-key cryptosystem based on three new hardnesses: the modular subset product problem, the multivariate arrangement problem, and the super logarithm problem in a prime field, shows the correctness of the decryption and verification algorithms, and infers that the probability that a plaintext solution is not unique is nearly zeroth. The authors discuss necessity and sufficiency of the lever function for preventing a continued fraction attack, explain the relation between the lever function and a random oracle, and analyze the security of REESSE1+ against recovering a plaintext from a ciphertext, extracting a private key from a public key or a signature, and faking a digital signature via a public key or known signatures with a public key. On the basis of analysis, believe that the security of REESSE1+ is at least equal to the time complexity of O...

  4. Passing the English as a second language (ESL) supplemental texes exam keys to certification and language proficient learners

    CERN Document Server

    Wilmore, Elaine L

    2014-01-01

    Master the TExES with down-to-earth test prep strategies ESL certification is attainable if one understands the domains and competencies represented in the test and masters test prep skills. Dr. Elaine Wilmore, known for her popular TExES preparation seminars, synthesizes her knowledge and experiences and gives readers a practical approach to passing the ESL Supplemental Exam. Written in a conversational tone, the book uses real examples to help readers connect theory with actual practice and offers: Thorough discussions of relevant concepts related to domains and competencies Tables and graph

  5. Passing the English as a second language (ESL) supplemental texes exam keys to certification and language proficient learners

    CERN Document Server

    Wilmore, Elaine L

    2014-01-01

    Master the TExES with down-to-earth test prep strategies ESL certification is attainable if one understands the domains and competencies represented in the test and masters test prep skills. Dr. Elaine Wilmore, known for her popular TExES preparation seminars, synthesizes her knowledge and experiences and gives readers a practical approach to passing the ESL Supplemental Exam. Written in a conversational tone, the book uses real examples to help readers connect theory with actual practice and offers: Thorough discussions of relevant concepts related to domains and competencies Tables and graph

  6. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    KAUST Repository

    Zorgui, Marwen

    2016-04-06

    This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint A on the channel input. The optimal input distribution is proved to be discrete with finite support. To overcome the computationally heavy search for the optimal discrete distribution, several suboptimal schemes are proposed and shown numerically to perform close to the capacity. Moreover, lower and upper bounds for the secret-key capacity are provided and used to prove that the secret-key capacity converges for asymptotic high values of A, to the secret-key capacity with an average power constraint A2. Finally, when the amplitude constraint A is small (A ! 0), the secret-key capacity is proved to be asymptotically equal to the capacity of the legitimate user with an amplitude constraint A and no secrecy constraint.

  7. A generalization of Paillier's public-key system with applications to electronic voting

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jurik, Mads Johan; Nielsen, Jesper Buus

    2010-01-01

    We propose a generalization of Paillier's probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization is as se......We propose a generalization of Paillier's probabilistic public-key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property. We show that the generalization...... is as secure as Paillier's original system and propose several ways to optimize implementations of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge protocols to show that a given ciphertext encrypts one of a set of given...... schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can...

  8. A new notion of soundness in bare public-key model

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yunlei; ZHU Hong

    2003-01-01

    A new notion of soundness in bare public-key (BPK) model is presented. This new notion just lies in between one-time soundness and sequential soundness and its reasonableness is justified in the context of resettable zero-knowledge when resettable zero-knowledge prover is implemented by smart card.

  9. Gaussian elimination in split unitary groups with an application to public-key cryptography

    Directory of Open Access Journals (Sweden)

    Ayan Mahalanobis

    2017-07-01

    Full Text Available Gaussian elimination is used in special linear groups to solve the word problem. In this paper, we extend Gaussian elimination to split unitary groups. These algorithms have an application in building a public-key cryptosystem, we demonstrate that.

  10. Practical Cryptanalysis of a Public-key Encryption Scheme Based on New Multivariate Quadratic Assumptions

    DEFF Research Database (Denmark)

    Albrecht, Martin Roland; Faugére, Jean-Charles; Fitzpatrick, Robert

    2014-01-01

    In this paper, we investigate the security of a public-key encryption scheme introduced by Huang, Liu and Yang (HLY) at PKC’12. This new scheme can be provably reduced to the hardness of solving a set of quadratic equations whose coefficients of highest degree are chosen according to a discrete...

  11. Toekomstvaste fysieke toegangsystemen : Public Key Infrastructure als oplossing voor fysiek toegangbeheer

    NARCIS (Netherlands)

    Kleinhuis, G.; Olk, J.G.E.

    2011-01-01

    Voor fysieke toegangssystemen wordt veelal gebruik gemaakt van toegangspassen met een contactlose chip. Soms zijn deze passen ook nog voorzien van een PKI (Public Key Infrastructure) contactchip voor toegang tot ICT en/of het plaatsen van een digitale handtekening. Ook voor fysieke toegang bied PKI

  12. Toekomstvaste fysieke toegangsystemen : Public Key Infrastructure als oplossing voor fysiek toegangbeheer

    NARCIS (Netherlands)

    Kleinhuis, G.; Olk, J.G.E.

    2011-01-01

    Voor fysieke toegangssystemen wordt veelal gebruik gemaakt van toegangspassen met een contactlose chip. Soms zijn deze passen ook nog voorzien van een PKI (Public Key Infrastructure) contactchip voor toegang tot ICT en/of het plaatsen van een digitale handtekening. Ook voor fysieke toegang bied PKI

  13. [Screening on key techniques used for surveillance and disposal of public health emergencies].

    Science.gov (United States)

    Zhu, Q R; Yang, L; Ma, H Y; Xie, W Q; Cong, L M; Xu, L W

    2017-06-10

    Objective: To explore the key techniques used for surveillance and disposal of infectious diseases, food poisoning and hospital infection to improve the ability of surveillance and disposal on public health emergency. Methods: Framework on surveillance and disposal of infectious diseases, food poisoning and hospital infection was set up, based on literature review and expert group discussion. Delphi method and technique for order preference by similarity to ideal solution comprehensive evaluation method were used for ordering preference by similarity, to screen key techniques set for surveillance and disposal of the above said events. Results: Framework to be used for selecting key techniques was designed, based on the classification of emergency events, processing cycle of emergency events and level of techniques. Twenty six public health experts were selected for a 2-round consultation, with their authority as 0.796. Ten key techniques with important significance for surveillance and disposal of infectious diseases, food poisoning and hospital infection were selected from each event. Among these key techniques, the early-warning system was recognized as the key technique, important for the surveillance and disposal of all three emergency events. Items as technology used for unknown pathogenic microorganism detection, personal protection, gene sequencing and tracing technology, microorganism molecular typing technology, nucleic acid detection technology etc. were the key techniques and need to develop for the surveillance and disposal of infectious diseases and iatrogenic infection. Data regarding key technologies on security and privacy, early warning and forecasting, field rapid detection were sorted out that all in need to improve the surveillance programs on disposal of infectious diseases and food poisoning. Data exchange appeared another key technique on infectious diseases, with toxin detection and other 5 techniques the key techniques for food poisoning

  14. BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra

    Directory of Open Access Journals (Sweden)

    Nadia M.G. Alsaidi

    2016-11-01

    Full Text Available New terms such as closest vector problem (CVP and the shortest vector problem (SVP, which have been illustrated as NP-hard problem, emerged, leading to a new hope for designing public key cryptosystem based on certain lattice hardness. A new cryptosystem called NTRU is proven computationally efficient and it can be implemented with low cost. With these characteristics, NTRU possesses advantage over others system that rely on number-theoretical problem in a finite field (e.g. integer factorization problem or discrete logarithm problem. These advantages make NTRU a good choice for many applications. After the adaptation of NTRU, many attempts to generalize its algebraic structure have appeared. In this study, a new variant of the NTRU public key cryptosystem called BITRU is proposed. BITRU is based on a new algebraic structure used as an alternative to NTRU-mathematical structure called binary algebra. This commutative and associative. Establishing two public keys in the proposed system has distinguished it from NTRU and those similar to NTRU cryptosystems. This new structure helps to increase the security and complexity of BITRU. The clauses of BITRU, which include key generation, encryption, decryption, and decryption failure, are explained in details. Its suitability of the proposed system is proven and its security is demonstrated by comparing it with NTRU.

  15. 75 FR 27855 - Certifications Pursuant to Section 609 of Public Law 101-162

    Science.gov (United States)

    2010-05-18

    ... Public Law 101-162 SUMMARY: On April 30, 2010, the Department of State certified, pursuant to Section 609 of Public Law 101-162 (``Section 609''), that 13 nations have adopted programs to reduce the... 609 of Public Law 101-162 prohibits imports of certain categories of shrimp unless the...

  16. Increasing Ranks of Linear Finite Automata and Complexity of FA Public Key Cryptosystem

    Institute of Scientific and Technical Information of China (English)

    鲍丰

    1994-01-01

    The encryption algorithm of finite automata (FA) public key cryptosystem is implemented by a weakly invertible finite automata (WIFA) which is composed of a nonlinear WIFA with delay 0 and a linear WIFA with delay τ. In this paper, we proved that such an automaton bears the same properties as the linear WIFA and the increasing ranks of the latter are key factors to affecting the former. A probabilistic algorithm is given to realize a ciphertext attack, and its complexity is analysed through the increasing ranks of the linear WIFA. The size of the parameters for safe linear WIFA is estimated.

  17. A robust certification service for highly dynamic MANET in emergency tasks

    DEFF Research Database (Denmark)

    Ge, M; Lam, K Y; Gollmann, Dieter

    2009-01-01

    public keys in our scenario. For issuance and/or revocation of mission-specific certificate, a Mission-specific Certificate Authority (MCA), which consists of a collection of server nodes to operate the threshold cryptographic scheme, is proposed. Furthermore, to cater for the occurrence of network...

  18. 21 CFR 1311.25 - Requirements for obtaining a CSOS digital certificate.

    Science.gov (United States)

    2010-04-01

    ... request for certification of the public digital signature key. After the request is approved, the... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for obtaining a CSOS digital... REQUIREMENTS FOR ELECTRONIC ORDERS AND PRESCRIPTIONS (Eff. 6-1-10) Obtaining and Using Digital Certificates for...

  19. Cryptanalysis of the public key encryption based on multiple chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Linhua [College of Mathematics and Computer, Chongqing Normal University, Chongqing, 400047 (China)], E-mail: Linzhang@cqu.edu.cn

    2008-08-15

    Recently, Ranjan proposed a novel public key encryption technique based on multiple chaotic systems [Phys Lett 2005;95]. Unfortunately, Wang soon gave a successful attack on its special case based on Parseval's theorem [Wang K, Pei W, Zhou L, et al. Security of public key encryption technique based on multiple chaotic system. Phys Lett A, in press]. In this letter, we give an improved example which can avoid the attack and point out that Wang cannot find the essential drawback of the technique. However, further experimental result shows Ruanjan's encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated.

  20. Public key Steganography Using Discrete Cross-Coupled One-Dimensional Chaotic Maps

    Directory of Open Access Journals (Sweden)

    Mahdiyeh Majidpour

    2013-07-01

    Full Text Available By cross-coupling two one-dimensional chaotic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete cross-coupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and decompressing, and also using public key enhanced difficulty of the algorithm. Simulation results show that in addition to excessive capacity, this method has high robustness and resistance against hackers and can be applicable in secret communication. Also the PSNR value is high compared to the other works.

  1. A Generalisation, a Simplification and some Applications of Paillier's Probabilistic Public-Key System

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jurik, Mads Johan

    2001-01-01

    to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimised such that for a certain range of parameter values, a ballot has size only O(log L) bits.......We propose a generalisation of Paillier's probabilistic public key system, in which the expansion factor is reduced and which allows to adjust the block length of the scheme even after the public key has been fixed, without loosing the homomorphic property. We show that the generalisation...... blocks can be used for applying the scheme to efficient electronic voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up...

  2. [Translational research in geriatrics? A plea based on current biomedical key publications].

    Science.gov (United States)

    Bollheimer, L C; Volkert, D; Bertsch, T; Bauer, J; Klucken, J; Sieber, C C; Büttner, R

    2013-08-01

    Contemporary geriatric research focuses mainly on observational clinical studies and epidemiological surveys and the translation of basic scientific results from biogerontology into a clinical context is often neglected. Following a definition of translational research the article gives an overview of recent key publications in experimental biogerontology with a special emphasis on their relevance for clinical geriatrics. The topics dealt with include age-induced loss of skeletal muscle (sarcopenia), the aging immune system (immunosenescence) and neurodegenerative disorders (Alzheimer's and Parkinson's disease).

  3. Stakeholders' perception of key performance indicators (KPIs) of public-private partnership (PPP) projects

    OpenAIRE

    Olabode Emmanuel Ogunsanmi

    2013-01-01

    The study investigates key performance indicators (KPIs) that could improve performance of public-private partnership (PPP) projects in Nigeria. The study objectives include a comparison of stakeholders’ perception on KPIs and to investigate if significant difference exists between stakeholders’ perceptions on most KPIs. A structured questionnaire was used to collect information from various respondents who were recently involved in PPP projects. Random sampling technique was used to select f...

  4. 7 CFR Appendix B to Subpart B of... - Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Certification of Independent Certified Public Accountant Regarding Notes To Be Issued Pursuant to 7 CFR 1744.30(c) B Appendix B to Subpart B of Part 1744... Accommodations and Subordination Policy Pt. 1744, Subpt. B, App. B Appendix B to Subpart B of Part...

  5. Pesticide Applicator Training Manual, Category 8A: General Public Health Pest Control for New Jersey. A Training Program for the Certification of Commercial Pesticide Applicators, and Study Questions.

    Science.gov (United States)

    Schulze, Terry L.; Kriner, Ray R.

    This training manual provides information needed to meet the minimum EPA standards for certification as a commercial applicator of pesticides in the public health pest control category. The text discusses invertebrate pests such as cockroaches, lice, fleas, and mites, vertebrate pests; and plant pests such as poison ivy and ragweed. A study guide…

  6. PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors

    Directory of Open Access Journals (Sweden)

    Changsheng Wan

    2015-01-01

    Full Text Available Due to limited energy of “wireless image sensors (WISs,” existing data integrity protection mechanisms typically employ a hash-function-based signing algorithm to generate “message authentication codes (MACs” for long image frames. However, hash-function-based signing algorithm requires the WIS and the “end user (EU” sharing a secret, which leads to a new security issue: Once the EU becomes malicious due to some reasons, it will be able to forge the WIS’s data since it holds the shared secret. Therefore, public-key cryptography is desirable. Unfortunately, public-key cryptographic operations are quite time-consuming for energy-restrained WISs. Facing this dilemma, we present a novel data integrity protection protocol named PKDIP in this paper. Similar to the mechanisms of this field, PKDIP generates MACs for data integrity protection. However, different from other well-known approaches, PKDIP introduces the “Montgomery Modular Multiplication (MontMM” technique to current public-key-based signing algorithms. Since MontMM is much more efficient than hash functions, PKDIP can reduce the signing cost significantly. Experimental results show PKDIP can even be more efficient than hash-function-based schemes.

  7. Securing U-Healthcare Sensor Networks using Public Key Based Scheme

    CERN Document Server

    Haque, Md Mokammel; Hong, Choong Seon

    2008-01-01

    Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data, austere privacy and security are inevitable for all parts of healthcare systems. However, the constantly evolving nature and constrained resources of sensors in WSN inflict unavailability of a lucid line of defense to ensure perfect security. In order to provide holistic security, protections must be incorporated in every component of healthcare sensor networks. This paper proposes an efficient security scheme for healthcare applications of WSN which uses the notion of public key cryptosystem. Our entire security scheme comprises basically of two parts; a key handshaking scheme based on simple linear operations and the derivation of decryption key by a receiver node for a particular sender in the network. Our architecture allows both base station to node or node to base station secure communications, and node-to-node secure commun...

  8. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-06-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  9. Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC

    Directory of Open Access Journals (Sweden)

    Arindam Sarkar

    2012-10-01

    Full Text Available In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography (FLHSPKC has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN has several major constraints likes’ inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC which is a sort of public-key cryptography used in wireless communication provides equivalent level of security like other existing public–key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.

  10. Key Data Gaps Regarding the Public Health Issues Associated with Opioid Analgesics.

    Science.gov (United States)

    Schmidt, Teresa D; Haddox, J David; Nielsen, Alexandra E; Wakeland, Wayne; Fitzgerald, John

    2015-10-01

    Most pharmaceutical opioids are used to treat pain, and they have been demonstrated to be effective medications for many. Their abuse and misuse pose significant public health concerns in the USA. Research has provided much insight into the prevalence, scope, and drivers of opioid abuse, but a holistic understanding is limited by a lack of available data regarding key aspects of this public health problem. Twelve data gaps were revealed during the creation of a systems-level computer model of medical use, diversion, nonmedical use, and the adverse outcomes associated with opioid analgesics in the USA. Data specific to these gaps would enhance the validity and real-world applications of systems-level models of this public health problem and would increase understanding of the complex system in which use and abuse occur. This paper provides an overview of these gaps, argues for the importance of closing them, and provides specific recommendations for future data collection efforts.

  11. 基于CPK组合公钥的电子签章技术研究%Study on Electronic Signature Technology based on Combined Public Key

    Institute of Scientific and Technical Information of China (English)

    范志强; 李成; 马兆丰; 芦效峰; 钮心忻

    2011-01-01

    With the development of e-government and e-commerce,the electronic documents have gradually replaced traditional paper-based documentation. Thus,how to ensure the security of the electronic document has become the key to the farther successful application of e-government and e-business.?The adoptions of CPK(Combined Public Key) in the design of electronic signature system and ID certificate in digital signature and verification,could make any two users confirm public key information only by their own identity labels with any dependence the trusted third party validation,thus simplifying the key exchange agreement,ensuring the documents integrity,confidentiality and undesirability,and realizing the efficient safe electronic signature system.%随着中国电子政务与电子商务的发展,电子文档已经逐渐取代传统的纸质文档。因此,如何保证电子文档的安全已经成为电子政务与电子商务进一步深入与成功应用的关键。采用组合公钥密码体制(Combined Public Key,CPK)设计电子签章系统,利用ID证书来进行数字签名与验证,使任何两个用户之间仅通过对方身份标识即可确认公钥信息,不依靠可信第三方验证,并简化了密钥交换协议,保证了文档的完整性、机密性和不可抵赖性,实现了高效安全的电子签章系统。

  12. Political Economy of the Public Forest Certification in the Gunungkidul Regency, DIY Province

    OpenAIRE

    Sulistyaningsih

    2013-01-01

    Public forests, particularly the ones in Java island, were developed in the 1930s by Dutch colonial government although the government’s policy did not fully recognize and legitimate them as state forests. Nevertheless, the contribution of the forests to local communities cannot be denied, because the existence of community forest can be lifesaving. That public forest after deforestation becomes an alternative solution can be seen in changes in the timber industry, in that demand ...

  13. Automated information extraction of key trial design elements from clinical trial publications.

    Science.gov (United States)

    de Bruijn, Berry; Carini, Simona; Kiritchenko, Svetlana; Martin, Joel; Sim, Ida

    2008-11-06

    Clinical trials are one of the most valuable sources of scientific evidence for improving the practice of medicine. The Trial Bank project aims to improve structured access to trial findings by including formalized trial information into a knowledge base. Manually extracting trial information from published articles is costly, but automated information extraction techniques can assist. The current study highlights a single architecture to extract a wide array of information elements from full-text publications of randomized clinical trials (RCTs). This architecture combines a text classifier with a weak regular expression matcher. We tested this two-stage architecture on 88 RCT reports from 5 leading medical journals, extracting 23 elements of key trial information such as eligibility rules, sample size, intervention, and outcome names. Results prove this to be a promising avenue to help critical appraisers, systematic reviewers, and curators quickly identify key information elements in published RCT articles.

  14. An efficient and provably-secure certificateless public key encryption scheme for telecare medicine information systems.

    Science.gov (United States)

    Guo, Rui; Wen, Qiaoyan; Shi, Huixian; Jin, Zhengping; Zhang, Hua

    2013-10-01

    Telecare Medicine Information Systems (TMIS) promote the traditional medical and healthcare services by information and communication technology. Since the physician and caregiver can monitor the patient's physiological condition remotely in TMIS, the confidentiality of this sensitive data should be protected, which is the key issue in the Health Insurance Portability and Accountability Act. In this paper, we propose an efficient certificateless public key encryption scheme without bilinear pairing for TMIS. Our proposal is proved to be secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. Moreover, after modifying the original model of the certificateless encryption, this scheme achieves Girault's trust level 3. Compared with the related protocols, the perform evaluations show that our scheme is more efficient and appropriate to collocate with low power mobile devices for TMIS.

  15. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  16. Enhanced Montgomery Multiplication on DSP Architectures for Embedded Public-Key Cryptosystems

    Directory of Open Access Journals (Sweden)

    Gastaldo P

    2008-01-01

    Full Text Available Abstract Montgomery's algorithm is a popular technique to speed up modular multiplications in public-key cryptosystems. This paper tackles the efficient support of modular exponentiation on inexpensive circuitry for embedded security services and proposes a variant of the finely integrated product scanning (FIPS algorithm that is targeted to digital signal processors. The general approach improves on the basic FIPS formulation by removing potential inefficiencies and boosts the exploitation of computing resources. The reformulation of the basic FIPS structure results in a general approach that balances computational efficiency and flexibility. Experimental results on commercial DSP platforms confirm both the method's validity and its effectiveness.

  17. In science communication, why does the idea of the public deficit always return? Exploring key influences.

    Science.gov (United States)

    Suldovsky, Brianne

    2016-05-01

    Despite mounting criticism, the deficit model remains an integral part of science communication research and practice. In this article, I advance three key factors that contribute to the idea of the public deficit in science communication, including the purpose of science communication, how communication processes and outcomes are conceptualized, and how science and scientific knowledge are defined. Affording science absolute epistemic privilege, I argue, is the most compelling factor contributing to the continued use of the deficit model. In addition, I contend that the deficit model plays a necessary, though not sufficient, role in science communication research and practice. Areas for future research are discussed.

  18. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    Energy Technology Data Exchange (ETDEWEB)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  19. The EU Clinical Trials Regulation: key priorities, purposes and aims and the implications for public health.

    Science.gov (United States)

    Flear, Mark L

    2016-03-01

    The replacement of the European Union (EU) Clinical Trials Directive by the new Clinical Trials Regulation (CTR), which entered into force on 16 June 2014 but will not apply before 28 May 2016, provides an opportunity to review the legal and political context within which this important aspect of research law and policy sits and to reflect on the implications for public health. My aim in this article is to relate the context to the key purposes and aims of EU law and policy on clinical trials in order to explain and clarify its orientation. On that basis, I argue that the CTR and the changes it introduces to the law on clinical trials are part of the EU's continued focus on market optimisation. It is this focus that orients and directs the wider pharmaceutical development pipeline, but that undermines the achievement of key public health objectives. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  20. Breaking Classical Public Key Cryptosystems by Using a Novel Ensemble Search Algorithm

    CERN Document Server

    Chen, C Y

    2004-01-01

    In this paper, we improve Bruschweiler's algorithm such that only one query is needed for searching the single object z from N=2^n unsorted elements. Our algorithm construct the new oracle query function g(.) satisfying g(x)=0 for all input x, except for one, say x=z, where g(z)=z. To store z, our algorithm extends from one ancillary qubit to n ancillary qubits. We then measure these ancillary qubits to discover z. We further use our ensemble search algorithm to attack classical public key cryptosystems. Given the ciphertext C=Ek(m, r) which is generated by the encryption function Ek(), a public key k, a message m, and a random number r, we can construct an oracle query function h(.) satisfying h(m', r')=0 if Ek(m', r')!=C and h(m', r')= (m', r') if Ek(m', r')=C. There is only one object, say (m, r), can be discovered in decryption of C. By preparing the input with all possible states of (m', r'), we can thus use our ensemble search algorithm to find the wanted object (m, r). Obviously, we break the classical...

  1. The Pursuit of Leadership in Energy and Environmental Design (LEED) Certification for Campus Housing at Public Universities

    Science.gov (United States)

    Konvalinka, April Hicks

    2014-01-01

    This dissertation identifies the reasons why institutions of higher education pursue Leadership in Energy and Environmental Design (LEED) certification for new construction of campus housing. The research was guided by three questions: 1. Why did the institution choose to pursue LEED certification for campus housing? 2. What considerations should…

  2. Key Performance Indicators for Maintenance Management Effectiveness of Public Hospital Building

    Directory of Open Access Journals (Sweden)

    Farhana Omar Mardhiah

    2017-01-01

    Full Text Available Effectiveness of management in maintenance aspect holds the key element in influencing the performance of overall maintenance management. Similarly, public hospital building needs an effective maintenance management as this type of building in nature is one of the most complex issues in the field of maintenance. Improper building maintenance management adopted by the organization significantly will interrupt the overall operation of the building. Therefore, this paper is aim to identifying the key performance indicator (KPI of effectiveness of maintenance management for the public hospital building. A total of 32 set of questionnaires were distributed to the maintenance manager for each hospital in the northern region of peninsular Malaysia by using self-administration strategy. The survey answer was analyzed by performing descriptive analysis in SPSS. Overall, the result of descriptive analysis shows that all the ten factors of effectiveness of maintenance management are accepted as KPI since the mean value is at least 3.93 which classified as important and significant. The most significant factor of effectiveness of maintenance management is task planning and scheduling with the mean score of 4.35. While less significant factor is identify as maintenance approach with the value of mean score is 3.93. The both results indicates that the management need to have well-structured planning for the maintenance works and also need to embrace the exact strategy of maintenance approach in order to achieved better overall performance of maintenance management. This study may draw a standard practice for the government in assessing the performance of public facilities in terms of maintenance management.

  3. Understanding key influencers' attitudes and beliefs about healthy public policy change for obesity prevention.

    Science.gov (United States)

    Raine, Kim D; Nykiforuk, Candace I J; Vu-Nguyen, Karen; Nieuwendyk, Laura M; VanSpronsen, Eric; Reed, Shandy; Wild, T Cameron

    2014-11-01

    As overweight and obesity is a risk factor for chronic diseases, the development of environmental and healthy public policy interventions across multiple sectors has been identified as a key strategy to address this issue. In 2009, a survey was developed to assess the attitudes and beliefs regarding health promotion principles, and the priority and acceptability of policy actions to prevent obesity and chronic diseases, among key policy influencers in Alberta and Manitoba, Canada. Surveys were mailed to 1,765 key influencers from five settings: provincial government, municipal government, school boards, print media companies, and workplaces with greater than 500 employees. A total of 236 surveys were completed with a response rate of 15.0%. Findings indicate nearly unanimous influencer support for individual-focused policy approaches and high support for some environmental policies. Restrictive environmental and economic policies received weakest support. Obesity was comparable to smoking with respect to perceptions as a societal responsibility versus a personal responsibility, boding well for the potential of environmental policy interventions for obesity prevention. This level of influencer support provides a platform for more evidence to be brokered to policy influencers about the effectiveness of environmental policy approaches to obesity prevention. © 2014 The Obesity Society.

  4. A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

    Directory of Open Access Journals (Sweden)

    Chin-Chen Chang

    2009-03-01

    Full Text Available In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt another approach to retain its blockwise independent property. Our scheme can avoid the conditions necessary for such attacks to befeasible. Furthermore, our scheme extracts the inherent image features and embeds them into this image as the watermark. This relieves users from having to maintain a database of watermarks from various sources. Experimental results show that the watermark insertion procedure has little effect on the visual quality of the watermarked image. They also show our scheme can locate the modifications made to the watermarked image, including imagescaling, cropping, geometric distortion, pixel value changes, etc.

  5. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  6. Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem

    CERN Document Server

    Kabetta, Herman; Suyoto,

    2012-01-01

    In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS is visible by all users as the original script, but it can not be granted changed. Website is a tool of information disseminator throughout the world, this is certainly can be used to a secret communication by using CSS as a message hider. This paper proposed a new scheme using web tools like CSS for hiding informations. This is a secret communication mechanism using text steganography techniques that is embedded messages on CSS files and is further encrypted using RSA as a public key cryptographic algorithm.

  7. Funding ATLAS 2012 key indicators for publicly funded research in Germany

    CERN Document Server

    Deutsche Forschungsgemeinschaft (DFG)

    2013-01-01

    The Funding ATLAS is a reporting system (previously referred to as the Funding Ranking) employed by the German Research Foundation (DFG) to provide information in the form of indicators of key developments in publicly funded research in Germany every three years. This English version of the Funding ATLAS 2012 presents selected findings from the more comprehensive German edition. At the core of the report are indicators that provide information on which subject areas have received funding at higher education and other research institutions in the period 2008-2010. This report also includes, as a supplement not found in the German edition, the decisions on the Excellence Initiative, which were taken shortly after the German edition of the Funding ATLAS 2012 was published. The report also addresses the subject of internationality by presenting selected indicators that show how attractive Germany's research institutions are for visiting scientists. In summary, the DFG Funding ATLAS furnishes reliable indicators o...

  8. Health and safety's stewardship of key business values: employees, public trust, and responsibility to shareholders.

    Science.gov (United States)

    Fulwiler, R D

    1993-11-01

    This paper reviews how one company has been able to develop and implement a highly effective job safety and health system and to sustain it at a high level of performance. This process begins with a simple but clear corporate safety and health policy statement: "Procter & Gamble insists on safe operation." It is driven by three critical values, namely: 1) its employees, 2) its public trust, and 3) its profits. The impact of workers' compensation costs on company profits is examined, along with the enormous savings in these costs that have been achieved by the company's commitment to total quality. This is followed by brief descriptions of the company's "Total Incident Rate" and it's "Key Elements" systems, and the relationships between them. The paper concludes with a description of the company's model for enabling all employees to make recommendations for continuous improvement of health and safety systems throughout all of the company's operations.

  9. Healthcare public key infrastructure (HPKI) and non-profit organization (NPO): essentials for healthcare data exchange.

    Science.gov (United States)

    Takeda, Hiroshi; Matsumura, Yasushi; Nakagawa, Katsuhiko; Teratani, Tadamasa; Qiyan, Zhang; Kusuoka, Hideo; Matsuoka, Masami

    2004-01-01

    To share healthcare information and to promote cooperation among healthcare providers and customers (patients) under computerized network environment, a non-profit organization (NPO), named as OCHIS, was established at Osaka, Japan in 2003. Since security and confidentiality issues on the Internet have been major concerns in the OCHIS, the system has been based on healthcare public key infrastructure (HPKI), and found that there remained problems to be solved technically and operationally. An experimental study was conducted to elucidate the central and the local function in terms of a registration authority and a time stamp authority by contracting with the Ministry of Economics and Trading Industries in 2003. This paper describes the experimental design with NPO and the results of the study concerning message security and HPKI. The developed system has been operated practically in Osaka urban area.

  10. [Reversal of aging and lifespan elongation. Current biomedical key publications and the implications for geriatrics].

    Science.gov (United States)

    Bollheimer, L C; Volkert, D; Bertsch, T; Sieber, C C; Büttner, R

    2013-08-01

    Biological aging means a time-dependent accumulation of changes to which a living organism is being exposed during its lifetime. Biological aging normally concurs with chronological aging the time frame of which is set by an upper limit, the lifespan (in humans approximately 120 years). New findings in experimental biogerontology are challenging both the dogma of irreversibility of biological aging and the preset species-specific limitations of life. The present overview first explains the general principle of rejuvenation and reversal of biological aging with paradigms from stem cell research. Secondly, recent key publications on artificial telomerase elongation and (alleged) lifespan enhancement by sirtuins and resveratrol will be discussed with an emphasis on the implications for (future) geriatric medicine.

  11. A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie–Hellman with privacy preserving public key infrastructure

    Indian Academy of Sciences (India)

    Vankamamidi S Naresh; Nistala V E S Murthy

    2015-10-01

    In this paper a new two-round authenticated contributory group key agreement based on Elliptic Curve Diffie–Hellman protocol with Privacy Preserving Public Key Infrastructure (PP-PKI) is introduced and is extended to a dynamic authenticated contributory group key agreement with join and leave protocols for dynamic groups. The proposed protocol provides such security attributes as forward secrecy, backward secrecy, and defense against man in the middle (MITM) and Unknown keyshare security attacks and also authentication along with privacy preserving attributes like anonymity, traceability and unlinkability. In the end, they are compared with other popular Diffie–Hellman and Elliptic Curve Diffie–Hellman based group key agreement protocols and the results are found to be satisfactory.

  12. 77 FR 12883 - Announcement of Public Briefings on the Changes to the Labor Certification Process for the...

    Science.gov (United States)

    2012-03-02

    ... to the Labor Certification Process for the Temporary Non-Agricultural Employment of H-2B Aliens in...-agricultural employment. See Temporary Non-Agricultural Employment of H-2B Aliens in the United States,...

  13. 75 FR 13784 - Announcement of Public Webinar on the Changes to the Labor Certification Process for the...

    Science.gov (United States)

    2010-03-23

    ... Certification Process for the Temporary Agricultural Employment of H-2A Aliens in the United States AGENCY... seasonal agricultural employment. See Temporary Agricultural Employment of H-2A Aliens in the United...

  14. The Swedish-Norwegian Electricity Certificate Market - Annual Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    The first joint annual report from the Swedish Energy Agency and the Norwegian Water Resources and Energy Directorate (NVE) about the Swedish-Norwegian electricity certificate market has now been completed. With this report, we wish to present a picture of the most important events and key figures for the electricity certificate market during 2012. For further information about the electricity certificate system and the electricity certificate market, please see the web sites of either public authority. Since 1 January 2012, Sweden and Norway have had a common market for electricity certificates. It is based on the Swedish electricity certificate market, which has been in existence since 2003. The goal of the electricity certificate market is to increase the renewable electricity production in both countries combined by 26.4 TWh by the end of 2020. Sweden and Norway are responsible for financing half of the increase each, but it is up to the market to decide where and when the new production is to take place. In addition to information about fulfilment of the common goal, this report also includes a summary of approved production in the Swedish electricity certificate system up to the end of 2011 and approved plants in the Norwegian transitional settlement. The Agency and NVE are happy to receive feedback about the annual report. Please contact us if you wish to put forward your views on how to make next year's report even better.

  15. Wind turbine certification - the committee draft by IEC-TC88-WG9

    Energy Technology Data Exchange (ETDEWEB)

    Hauge Madsen, P. [Risoe National Lab., Wind Energy and Atmospheric Physics Dept., Roskilde (Denmark)

    1999-03-01

    In 1995 the Technical Committee TC88 of the International Electrotechnical Commission decided to start a new work item, namely to prepare a standard for the certification procedures for wind turbines with respect to safety, performance, interaction with the public grid, environmental requirements and the documentation requested by the certification bodies. The purpose was to provide a common basis for certification of wind turbines, including a basis for accreditation of certification bodies and mutual recognition of certificates. A working group (WG9) was created to prepare a committee draft. WG9 submitted the result late in 1998 to TC88. This paper presents the committee draft Standard, which defines a certification system for Wind Turbine Generator Systems. Key issues in the evaluation of conformity with these standards and identified needs for other technical criteria and procedures are presented. (au) 10 refs.

  16. Performance Evaluation of Public Key Based Authentication in Future Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Kambourakis Georgios

    2004-01-01

    Full Text Available While mobile hosts are evolving into full-IP enabled devices, there is a greater demand to provide a more flexible, reconfigurable, and scalable security mechanism in mobile communication systems beyond 3G (B3G. Work has already begun on such an “all-IP” end-to-end solution, commonly referred to as 4G systems. Fully fledged integration between heterogeneous networks, such as 2.5G, UMTS, WLAN, Bluetooth, and the Internet, demands fully compatible, time-tested, and reliable mechanisms to depend on. SSL protocol has proved its effectiveness in the wired Internet and it will probably be the most promising candidate for future wireless environments. In this paper, we discuss existing problems related to authentication and key agreement (AKA procedures, such as compromised authentication vectors attacks, as they appear in current 2/2.5G/3G mobile communication systems, and propose how SSL, combined with public key infrastructure (PKI elements, can be used to overcome these vulnerabilities. In this B3G environment, we perceive authentication as a service, which has to be performed at the higher protocol layers irrespective of the underlying network technology. Furthermore, we analyze the effectiveness of such a solution, based on measurements of a “prototype” implementation. Performance measurements indicate that SSL-based authentication can be possible in terms of service time in future wireless systems, while it can simultaneously provide both the necessary flexibility to network operators and a high level of confidence to end users.

  17. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication. The objective is addressed in a literature review and a case study. The literature...... recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation...... review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed...

  18. Coordination between veterinary services and other relevant authorities: a key component of good public governance.

    Science.gov (United States)

    Bellemain, V

    2012-08-01

    Coordination between Veterinary Services and other relevant authorities is a key component of good public governance, especially for effective action and optimal management of available resources. The importance of good coordination is reflected in the World Organisation for Animal Health'Tool forthe Evaluation of Performance of Veterinary Services', which includes a critical competency on coordination. Many partners from technical, administrative and legal fields are involved. The degree of formalisation of coordination tends to depend on a country's level of organisation and development. Contingency plans against avian influenza led to breakthroughs in many countries in the mid-2000s. While interpersonal relationships remain vital, not everything should hinge on them. Organisation and management are critical to operational efficiency. The distribution of responsibilities needs to be defined clearly, avoiding duplication and areas of conflict. Lead authorities should be designated according to subject (Veterinary Services in animal health areas) and endowed with the necessary legitimacy. Lead authorities will be responsible for coordinating the drafting and updating of the relevant documents: agreements between authorities, contingency plans, standard operating procedures, etc.

  19. E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

    Directory of Open Access Journals (Sweden)

    Najlaa A. Abuadhmah

    2010-01-01

    Full Text Available Problem statement: Visa is a very important travelling document, which is an essential need at the point of entry of any country we are visiting. However an important document such as visa is still handled manually which affects the accuracy and efficiency of processing the visa. Work on e-visa is almost unexplored. Approach: This study provided a detailed description of a newly proposed e-visa verification system prototyped based on RFID technology. The core technology of the proposed e-visa verification system is based on Identity Based Encryption (IBE and Public Key Infrastructure (PKI. This research provided comparison between both methods in terms of processing time and application usability. Results: The result showed the e-visa verification system is highly flexible when implemented with IBE and on the other hand produces better processing speed when implemented with PKI. Conclusion: Therefore, it is believed that the proposed e-visa verification schemes are valuable security protocol for future study on e-visa.

  20. Optimal-Rate Coding Theorem For Adversarial Networks in the Public-Key Setting

    CERN Document Server

    Amir, Yair; Ostrovksy, Rafail

    2008-01-01

    In this paper, we establish an optimal-rate (interactive) coding theorem in the public-key setting for synchronous networks in the presence of a malicious poly-time adversary for dynamically changing networks. Namely, even if the majority of the nodes are controlled by a malicious adversary and the topology of the network is changing at each round, then as long as there is some path of non-corrupted nodes connecting the sender and receiver at each round (though this path may change at every round) we construct a protocol with bounded memory per processor that achieves optimal transfer rate and negligible decoding error. This protocol will transmit polynomially many messages of polynomial size with constant overhead per bit. We stress that our protocol assumes no knowledge of which nodes are corrupted nor which path is reliable at any round. Our interactive coding theorem states that our protocol cannot be affected in a meaningful way by any polynomial-time malicious adversary whose goal is to disrupt and dest...

  1. Stakeholders' perception of key performance indicators (KPIs of public-private partnership (PPP projects

    Directory of Open Access Journals (Sweden)

    Olabode Emmanuel Ogunsanmi

    2013-12-01

    Full Text Available The study investigates key performance indicators (KPIs that could improve performance of public-private partnership (PPP projects in Nigeria. The study objectives include a comparison of stakeholders’ perception on KPIs and to investigate if significant difference exists between stakeholders’ perceptions on most KPIs. A structured questionnaire was used to collect information from various respondents who were recently involved in PPP projects. Random sampling technique was used to select forty-five (45 respondents out of which thirty-one (31 responses were used for the data analysis. The results indicate that top KPIs for performance improvement are levels of design complexity and technological advancement, and return on investment. Stakeholders agree on most of the rankings of the KPIs. The general perception of stakeholders was similar on most KPIs except for a few divergent opinions. The study findings have an implication for policy and decision making such that stakeholders could pay special attention to the KPIs identified, that could improve construction project performance. Finally the study recommends further research to explore KPIs for other procurement options.

  2. Applications of Public Key Watermarking for Authentication of Job-Card in MGNREGA

    Directory of Open Access Journals (Sweden)

    Sunil Karforma

    2012-01-01

    Full Text Available Nowadays different state governments and central governments have taken initiative to successfully implement E-Governance in various areas of services applying Information and Communication Technology (ICT to provide better transparency, accuracy & security of its services to the citizens. In September, 2005, Parliament of India has passed the Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA, to enhance livelihood security by giving at least 100 days of guaranteed wage employment in a financial year to every house-hold in rural India. E-Governance solutions helps to simplify complex manual activities and supports transparent wage payment through agencies like Bank and Post-Offices. In e-governance, information’s are exchanged between communicating parties via Internet and message may be changed, modified or destroyed by hackers during its transmission through Internet. So, information hiding is needed at the time of exchanging information via Internet. In this paper, we propose a tool, called Public-Key Watermarking algorithm, for integrity verification of Job-Card (JC issued to individual house-hold by state governments, so that the watermark is capable enough to detect any changes made to the Job-Card by malicious users and can also identify fraudulent wage payment.

  3. 42 CFR 411.373 - Certification.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Certification. 411.373 Section 411.373 Public... Entities Furnishing Designated Health Services § 411.373 Certification. (a) Every request must include the following signed certification: “With knowledge of the penalties for false statements provided by 18...

  4. A Market Analysis of Publications, Trade Conferences, and Key Events for Fleet Readiness Center Southwest

    Science.gov (United States)

    2007-12-01

    Win and Keep Big Customers. Austin: Bard Press, 2005. Kotler , Philip and Kevin Lane Keller. Marketing Management. Upper Saddle River, NJ...stimulate awareness and demand with little or no cost. Kotler and Keller describe public relations and publicity as “a variety of programs designed to...broadcast media to promote something.”13 Kotler and Keller also argue that there is an appeal to the use of public relations and publicity that is based

  5. Key challenges of offshore wind power: Three essays addressing public acceptance, stakeholder conflict, and wildlife impacts

    Science.gov (United States)

    Bates, Alison Waterbury

    been proposed. The essay examines how the public considers the societal tradeoffs that are made to develop small-scale, in-view demonstration wind projects instead of larger facilities farther offshore. Results indicate that a strong majority of the public supports near-shore demonstration wind projects in both states. Primary reasons for support include benefits to wildlife, cost of electricity, and job creation, while the primary reasons for opposition include wildlife impacts, aesthetics, tourism, and user conflicts. These factors differ between coastal Delaware and greater Atlantic City and highlight the importance of local, community engagement in the early stages of development. The second essay examines the interaction of a new proposed use of the ocean---offshore wind---and a key existing ocean user group---commercial fishers. A key component of offshore wind planning includes consideration of existing uses of the marine environment in order to optimally site wind projects while minimizing conflicts. Commercial fisheries comprise an important stakeholder group, and may be one of the most impacted stakeholders from offshore renewable energy development. Concern of the fishing industry stems from possible interference with productive fishing grounds and access within wind developments resulting in costs from increased effort or reduction in catch. Success of offshore wind development may in part depend on the acceptance of commercial fishers, who are concerned about loss of access to fishing grounds. Using a quantitative, marine spatial planning approach in the siting of offshore wind projects with respect to commercial fishing in the mid-Atlantic, U.S., this essay develops a spatially explicit representation of potential conflicts and compatibilities between these two industries in the mid-Atlantic region of the United States. Areas that are highly valuable to the wind industry are determined through a spatial suitability model using variable cost per unit

  6. On the Detection of Fake Certificates via Attribute Correlation

    Directory of Open Access Journals (Sweden)

    Xiaojing Gu

    2015-06-01

    Full Text Available Transport Layer Security (TLS and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs for peer authentication. Unfortunately, the most recent research reveals that, if any one of the pre-trusted CAs is compromised, fake certificates can be issued to intercept the corresponding SSL/TLS connections. This security vulnerability leads to catastrophic impacts on SSL/TLS-based HTTPS, which is the underlying protocol to provide secure web services for e-commerce, e-mails, etc. To address this problem, we design an attribute dependency-based detection mechanism, called SSLight. SSLight can expose fake certificates by checking whether the certificates contain some attribute dependencies rarely occurring in legitimate samples. We conduct extensive experiments to evaluate SSLight and successfully confirm that SSLight can detect the vast majority of fake certificates issued from any trusted CAs if they are compromised. As a real-world example, we also implement SSLight as a Firefox add-on and examine its capability of exposing existent fake certificates from DigiNotar and Comodo, both of which have made a giant impact around the world.

  7. A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2015-01-01

    Full Text Available A digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN. The scheme is founded on the access control scheme on the basis of characteristic expression (named CEB scheme. Data is divided by characteristics and the key for encryption is related to characteristic expression. Only the key matching with characteristic expression can decrypt the data. Meanwhile, three distributed certificate detection methods are designed to prevent the certificate from being misappropriated by hostile anonymous users. When a user starts query, the key access control method can judge whether the query is valid. In this case, the scheme can achieve public certificate of users and effectively protect query privacy as well. The security analysis and experiments show that the proposed scheme is superior in communication overhead, storage overhead, and detection probability.

  8. An Investigation of the National School Board Association Key Work Standards for Public Policy Leadership and School Board Chair Performance

    Science.gov (United States)

    Quarles, Roger C.

    2011-01-01

    This multiple case qualitative study addressed the National School Board Association's (NSBA) Key Work standards for public policy leadership by local school boards, and how three elite school board chairs understood and implemented those standards. Elite board chair status was defined by experience, training, and peer recognition. The study…

  9. An Investigation of the National School Board Association Key Work Standards for Public Policy Leadership and School Board Chair Performance

    Science.gov (United States)

    Quarles, Roger C.

    2011-01-01

    This multiple case qualitative study addressed the National School Board Association's (NSBA) Key Work standards for public policy leadership by local school boards, and how three elite school board chairs understood and implemented those standards. Elite board chair status was defined by experience, training, and peer recognition. The study…

  10. Public health ethics: key concepts and issues in policy and practice

    National Research Council Canada - National Science Library

    Dawson, Angus

    2011-01-01

    .... Topics covered include the nature of public health ethics, the concepts of disease and prevention, risk and precaution, health inequalities and justice, screening, vaccination and disease control...

  11. Best practices for interacting with the public about wildland fire: Key findings from interviews

    Science.gov (United States)

    Daniel Berkman

    2012-01-01

    Interviews were conducted with public information and line officers about wildland fire communications with the public. The goal of these interviews was to determine the best practices and most useful content and format for an annotated bibliography about external wildland fire communications, i.e., does the current literature reviewed address the issues of greatest...

  12. Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks

    Indian Academy of Sciences (India)

    V S JANANI; M S K MANIKANDAN

    2016-10-01

    The wireless and dynamic nature of mobile ad hoc networks (MANET) render them more vulnerable to security attacks. However, providing a security mechanism implicitly has been a major challenge in such an ad-hoc environment. Certificate management plays an important role in securing an ad-hoc network.Certificate assignment, verification, and revocation complexity associated with the Public Key Infrastructure (PKI) framework is significantly large. Smaller the size of the network lesser will be the certificate management complexity. However, smaller the size, large will be the overall infrastructural cost, and also larger will be the overall redundant certificates due to multiple certificate assignment at the boundary regions, that in turn affects the prompt and accurate certificate revocation. By taking these conflicting requirements into consideration, we propose the trust-based hexagonal clustering for an efficient certificate management (THCM) scheme, to bear an absolutely protected MANET Disparate to the existing clustering techniques, we present a hexagonal geographicclustering model with Voronoi technique where trust is accomplished. In particular, to compete against attackers, we initiate a certificate management strategy in which certificate assignment, verification, and revocation are carried out efficiently. The performance of THCM is evaluated by both simulation and empirical analysis in terms of effectiveness of revocation scheme (with respect to revocation rate and time), security, and communication cost. Besides, we conduct a mathematical analysis of measuring the parameters obtained from the two platforms in multiple times. Relevant results demonstrate that our design is efficient to guarantee a secured mobile ad hoc network.

  13. A New Approach to Provide Global Certificate Service in Virtual Enterprise

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    Certificate Authority (CA) is the core of public key infrastructure. However, the traditional structure of CA is either hierarchical or reticular, and none of them is suitable for security requirements come from the new trend in enterprise cooperation, namely virtual enterprise (VE). In this paper a new idea - virtual certificate authority (VCA), is proposed, as well as its implementation. The goal of VCA is to provide global certificate service over vital enterprise while keeping CA of each participant intact as much as possible. Unlike PEM, PGP, and BCA, by using secret sharing scheme, virtual CA avoids the need for TTP and supports virtual enterprise's feature of dynamical construction and destruction.

  14. Key issues of public relations of Europe: Findings from the European Communication Monitor 2007-2014

    Directory of Open Access Journals (Sweden)

    Dejan Vercic

    2014-10-01

    Full Text Available European Communication Monitor is the largest longitudinal research project in public relations practice in the world. Data collected annually from 2007 to 2014 show that practitioners perceive five issues as the most important for their work: linking business strategy and communication, coping with the digital evolution and social web, building and maintaining trust, dealing with the demand for more transparency and active audiences, and dealing with the speed and volume of information flow. Perception of the importance of various issues for the practice of public relations is largely dependent on the gender, geography (division between Northern and Western vs. Southern and Eastern Europe, and sector in which a practitioner works (corporate, government, NGO or agency. While gender and sectorial differences studied in academic public relations literature, divisions in public relations practice between North-Western and South-Eastern Europe are largely ignored.

  15. Building Interdisciplinary Research Capacity: a Key Challenge for Ecological Approaches in Public Health

    Directory of Open Access Journals (Sweden)

    Lindsay P. Galway

    2016-06-01

    Full Text Available The shortcomings of public health research informed by reductionist and fragmented biomedical approaches and the emergence of wicked problems are fueling a renewed interest in ecological approaches in public health. Despite the central role of interdisciplinarity in the context of ecological approaches in public health research, inadequate attention has been given to the specific challenge of doing interdisciplinary research in practice. As a result, important knowledge gaps exist with regards to the practice of interdisciplinary research. We argue that explicit attention towards the challenge of doing interdisciplinary research is critical in order to effectively apply ecological approaches to public health issues. This paper draws on our experiences developing and conducting an interdisciplinary research project exploring the links among climate change, water, and health to highlight five specific insights which we see as relevant to building capacity for interdisciplinary research specifically, and which have particular relevance to addressing the integrative challenges demanded by ecological approaches to address public health issues. These lessons include: (i the need for frameworks that facilitate integration; (ii emphasize learning-by-doing; (iii the benefits of examining issues at multiple scales; (iv make the implicit, explicit; and (v the need for reflective practice. By synthesizing and sharing experiences gained by engaging in interdisciplinary inquiries using an ecological approach, this paper responds to a growing need to build interdisciplinary research capacity as a means for advancing the ecological public health agenda more broadly.

  16. Efficient Certification Path Discovery for MANET

    Directory of Open Access Journals (Sweden)

    Georgios Kambourakis

    2010-01-01

    Full Text Available A Mobile Ad Hoc Network (MANET is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitioning, and wireless connections. These properties make traditional wireline security solutions not straightforwardly applicable in MANETs, and of course, constitute the establishment of a Public Key Infrastructure (PKI in such networks a cumbersome task. After surveying related work, we propose a novel public key management scheme using the well-known web-of-trust or trust graph model. Our scheme is based on a binary tree formation of the network's nodes. The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided. We compare our scheme with related work and show that it presents several advantages, especially when a fair balancing between security and performance is desirable. Simulations of the proposed scheme under different scenarios demonstrate that it is effective in terms of tree formation, join and leave occurrences, and certificate chain establishment.

  17. Civic participation and public spaces: a key factor for sustainable tourism in historic cities

    Directory of Open Access Journals (Sweden)

    Martin van der Zwan

    2016-06-01

    Full Text Available Attractive public spaces are crucial for tourism. After all, most tourists that visit a city, experience it by foot and increasingly by bicycle. Public spaces have to meet a few minimum requirements. If not, tourists will feel uncomfortable. For instance; a lot of rubbish and graffiti, worn out and damaged street furniture can cause a feeling of unsafety. Attractive public spaces are the ones that invite tourists to stay a bit longer than strictly necessary and sit down and relax. Some of these spaces are quit and green, others more vibrant, well dimensioned and furbished. In this paper I describe a method for defining and measuring the quality of public space and also for predicting the conclusion tourists may draw based on this; “will I revisit this place or not ?” In some cities inhabitants, local shop owners and local institutions voluntarily take the initiative to upgrade the quality of public spaces or even act as ‘city hosts’ to welcome visitors. These kinds of civic participation help to provide the unique experience many tourists are looking for.

  18. Finding your voice: key elements to consider when writing for publication.

    Science.gov (United States)

    Wollin, Judy Ann; Fairweather, Carrie Therese

    The dissemination of nursing knowledge rests on optimizing the accessibility of such knowledge among nurses and all other healthcare professionals. Nursing publications of all types, including research, case studies, reports, literature reviews, clinical audits, reflections on practice and letters to the editor, are important mechanisms for sharing knowledge and experience. Nurses need to publish their knowledge and experiences to inform and reflect on nursing practice. Barriers to writing for publication include inexperience and lack of know how. This article provides guidance for the novice writer.

  19. 76 FR 16549 - ESBWR Design Certification

    Science.gov (United States)

    2011-03-24

    ...; ] NUCLEAR REGULATORY COMMISSION 10 CFR Part 52 RIN 3150-AI85 ESBWR Design Certification AGENCY: Nuclear... operate an ESBWR design may do so by referencing this design certification rule (DCR). The applicant for certification of the ESBWR design is GE-Hitachi Nuclear Energy (GEH). The public is invited to submit...

  20. Public Key Infrastructure (PKI) And Virtual Private Network (VPN) Compared Using An Utility Function And The Analytic Hierarchy Process (AHP)

    OpenAIRE

    Wagner, Edward Dishman

    2002-01-01

    This paper compares two technologies, Public Key Infrastructure (PKI) and Virtual Private Network (VPN). PKI and VPN are two approaches currently in use to resolve the problem of securing data in computer networks. Making this comparison difficult is the lack of available data. Additionally, an organization will make their decision based on circumstances unique to their information security needs. Therefore, this paper will illustrate a method using a utility function and the Analytic Hie...

  1. 基于共享密钥的RFID认证协议%RFID Authentication Protocol Based on Public Crypto Key

    Institute of Scientific and Technical Information of China (English)

    冯军; 潘郁

    2012-01-01

    Aiming at the problems presently existing in security of the radio frequency identification (RFID) technology, the RFID security protocol is designed by adopting Hash function and public crypto key. The security and privacy issues existing in practical applications of RFID are analyzed, and the RFID authentication protocol based on NTRU public key crypto graphy system and Hash function is proposed. By adopting NTRU public key crypto system, the shared key is generated, and the shared key is conducted with Hash operation by using Hash function, and the information security of RFID is guaranteed. The theoretical analysis shows that this protocol can effectively protect the information from the secure attacks, e.g. , divulging, disguising and position tracking, etc.%针对目前无线射频识别(RHD)技术在安全性方面存在的问题,采用散列函数和共享密钥设计了RFID安全协议.分析了RFID在实际应用中存在的安全和隐私问题,提出了一种基于数论研究单元(NTRU)公钥密码系统和Hashh函数的RFID认证协议.该协议利用NTRU公钥密码系统产生系统的共享公钥,并运用Hash函数对共享公钥进行Hash运算,保证了RFID系统信息安全性.理论分析表明,该协议能有效地防止消息泄漏、伪装、定位跟踪等安全攻击.

  2. Antibody performance in ChIP-sequencing assays: From quality scores of public data sets to quantitative certification

    Science.gov (United States)

    Mendoza-Parra, Marco-Antonio; Saravaki, Vincent; Cholley, Pierre-Etienne; Blum, Matthias; Billoré, Benjamin; Gronemeyer, Hinrich

    2016-01-01

    We have established a certification system for antibodies to be used in chromatin immunoprecipitation assays coupled to massive parallel sequencing (ChIP-seq). This certification comprises a standardized ChIP procedure and the attribution of a numerical quality control indicator (QCi) to biological replicate experiments. The QCi computation is based on a universally applicable quality assessment that quantitates the global deviation of randomly sampled subsets of ChIP-seq dataset with the original genome-aligned sequence reads. Comparison with a QCi database for >28,000 ChIP-seq assays were used to attribute quality grades (ranging from ‘AAA’ to ‘DDD’) to a given dataset. In the present report we used the numerical QC system to assess the factors influencing the quality of ChIP-seq assays, including the nature of the target, the sequencing depth and the commercial source of the antibody.  We have used this approach specifically to certify mono and polyclonal antibodies obtained from Active Motif directed against the histone modification marks H3K4me3, H3K27ac and H3K9ac for ChIP-seq. The antibodies received the grades AAA to BBC ( www.ngs-qc.org). We propose to attribute such quantitative grading of all antibodies attributed with the label “ChIP-seq grade”. PMID:27335635

  3. Antibody performance in ChIP-sequencing assays: From quality scores of public data sets to quantitative certification.

    Science.gov (United States)

    Mendoza-Parra, Marco-Antonio; Saravaki, Vincent; Cholley, Pierre-Etienne; Blum, Matthias; Billoré, Benjamin; Gronemeyer, Hinrich

    2016-01-01

    We have established a certification system for antibodies to be used in chromatin immunoprecipitation assays coupled to massive parallel sequencing (ChIP-seq). This certification comprises a standardized ChIP procedure and the attribution of a numerical quality control indicator (QCi) to biological replicate experiments. The QCi computation is based on a universally applicable quality assessment that quantitates the global deviation of randomly sampled subsets of ChIP-seq dataset with the original genome-aligned sequence reads. Comparison with a QCi database for >28,000 ChIP-seq assays were used to attribute quality grades (ranging from 'AAA' to 'DDD') to a given dataset. In the present report we used the numerical QC system to assess the factors influencing the quality of ChIP-seq assays, including the nature of the target, the sequencing depth and the commercial source of the antibody.  We have used this approach specifically to certify mono and polyclonal antibodies obtained from Active Motif directed against the histone modification marks H3K4me3, H3K27ac and H3K9ac for ChIP-seq. The antibodies received the grades AAA to BBC ( www.ngs-qc.org). We propose to attribute such quantitative grading of all antibodies attributed with the label "ChIP-seq grade".

  4. Interviewing Key Informants: Strategic Planning for a Global Public Health Management Program

    Science.gov (United States)

    Kun, Karen E.; Kassim, Anisa; Howze, Elizabeth; MacDonald, Goldie

    2013-01-01

    The Centers for Disease Control and Prevention's Sustainable Management Development Program (SMDP) partners with low- and middle-resource countries to develop management capacity so that effective global public health programs can be implemented and better health outcomes can be achieved. The program's impact however, was variable. Hence, there…

  5. Key issues of public relations of Europe: findings from the European Communication Monitor 2007-2014

    NARCIS (Netherlands)

    Verčič, D.; Verhoeven, P.; Zerfass, A.

    2014-01-01

    European Communication Monitor is the largest longitudinal research project in public relations practice in the world. Data collected annually from 2007 to 2014 show that practitioners perceive five issues as the most important for their work: linking business strategy and communication, coping with

  6. Key issues of public relations of Europe: findings from the European Communication Monitor 2007-2014

    NARCIS (Netherlands)

    Verčič, D.; Verhoeven, P.; Zerfass, A.

    2014-01-01

    European Communication Monitor is the largest longitudinal research project in public relations practice in the world. Data collected annually from 2007 to 2014 show that practitioners perceive five issues as the most important for their work: linking business strategy and communication, coping with

  7. The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation

    CERN Document Server

    Su, Shenghui; Hu, Jun

    2008-01-01

    This paper gives the definitions of a nonnormal super-increasing sequence and a nonnormal subset sum separately, proves the two properties of a nonnormal super-increasing sequence, and proposes the REESSE2+ public-key encryption scheme which includes the three algorithms for key generation, encryption and decryption. The paper discusses the necessity and sufficiency of the lever function for preventing the Shamir extremum attack, analyzes the security of REESSE2+ against extracting a private key from a public key through the exhaustive search, recovering a plaintext from a ciphertext plus a knapsack of high density through the LLL lattice basis reduction method, and heuristically obtaining a plaintext through the meet-in-the-middle attack or the adaptive-chosen-ciphertext attack. The authors evaluate the time complexity of the REESSE2+ algorithms, compare REESSE2+ with ECC and NTRU, and find that the encryption speed of REESSE2+ is ten thousand times faster than ECC and NTRU bearing the matchable security, an...

  8. Policy Pathways: Energy Performance Certification of Buildings

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    Improving energy efficiency is one of the most effective measures to address energy security, climate change and economic objectives. The Policy Pathways series can help countries capture this potential by assisting with the implementation of the 25 energy efficiency policy recommendations that were published by the International Energy Agency (IEA) in 2008. This policy pathway on energy performance certification of buildings is the second in the series. It aims to provide a 'how-to' guide to policy makers and relevant stakeholders on the essential elements in implementing energy performance certification of buildings programmes. Energy performance certification of buildings is a way to rate the energy efficiency of individual buildings -- whether they be residential, commercial or public. It is a key policy instrument that can assist governments in reducing energy consumption in buildings. This policy pathway showcases experiences from countries around the world to show examples of good practice and delivers a pathway of ten critical steps to implement energy performance certification of buildings programmes.

  9. Absence from work and the medical sickness certificate.

    Science.gov (United States)

    Massoni, F; Salesi, M; Sarra, M V; Ricci, S

    2013-03-01

    Internet and dematerialization have greatly facilitated the medical profession. Contractual physicians and national health service doctors now have efficient tools for the electronic management of their routine administrative workload. A recent innovation is the medical sickness certificate issued by primary care providers and national health service physicians. Following postponements and uncertainties, procedures for the electronic completion and online transmission of the sickness certificate are now complete. The changes introduced by the so-called "Brunetta decree", however, have made its application difficult and continuous improvement to the system is needed, considering also the severe penalties imposed for violations. In the light of serious legal repercussions for health care professionals, this article examines various critical issues, highlighting the pitfalls and the network's enormous potential for ascertaining evidence of irregularities. The overheated debate on absenteeism due to illness, the diverse roles of national health physicians and self-employed doctors responsible for issuing a sickness certificate, and problems related to circumstances in which a doctor operates, are the key topics in this discussion. Computerization is an effective tool for optimizing public resources; however, it also seeks to ferret out, through the traceability of certification, abuse of medical certification, with severe penalties applied if certificates are discovered to contain misleading or untrue information.

  10. Public-private relationships in biobanking: a still underestimated key component of open innovation.

    Science.gov (United States)

    Hofman, Paul; Bréchot, Christian; Zatloukal, Kurt; Dagher, Georges; Clément, Bruno

    2014-01-01

    Access to human bioresources is essential to the understanding of human diseases and to the discovery of new biomarkers aimed at improving the diagnosis, prognosis, and the predictive response of patients to treatments. The use of biospecimens is strictly controlled by ethical assessment, which complies with the laws of the country. These laws regulate the partnerships between the biobanks and industrial actors. However, private-public partnerships (PPP) can be limiting for several reasons, which can hamper the discovery of new biological tests and new active molecules targeted to human diseases. The bottlenecks and roadblocks in establishing these partnerships include: poor organization of the biobank in setting up PPP, evaluation of the cost of human samples, the absence of experience on the public side in setting up contracts with industry, and the fact that public and private partners may not share the same objectives. However, it is critical, in particular for academic biobanks, to establish strong PPP to accelerate translational research for the benefits of patients, and to allow the sustainability of the biobank. The purpose of this review is to discuss the main bottlenecks and roadblocks that can hamper the establishment of PPP based on solid and trusting relationships.

  11. Why sustainable population growth is a key to climate change and public health equity.

    Science.gov (United States)

    Howat, Peter; Stoneham, Melissa

    2011-12-01

    Australia's population could reach 42 million by 2050. This rapid population growth, if unabated, will have significant social, public health and environmental implications. On the one hand, it is a major driver of climate change and environmental degradation; on the other it is likely to be a major contributor to growing social and health issues including a decline in quality of life for many residents. Disadvantaged and vulnerable groups will be most affected. The environmental, social and health-related issues include: pressure on the limited arable land in Australia; increased volumes of industrial and domestic waste; inadequate essential services; traffic congestion; lack of affordable housing; declining mental health; increased obesity problems; and inadequate aged care services. Many of these factors are related to the aggravation of climate change and health inequities. It is critical that the Australian Government develops a sustainable population plan with stabilisation of population growth as an option. The plan needs to ensure adequate hospitals and healthcare services, education facilities, road infrastructure, sustainable transport options, water quality and quantity, utilities and other amenities that are already severely overburdened in Australian cities. There is a need for a guarantee that affordable housing will be available and priority be given to training young people and Indigenous people for employment. This paper presents evidence to support the need for the stabilisation of population growth as one of the most significant measures to control climate change as well as to improve public health equity.

  12. [Key measures for developing palliative care from a public health perspective. Initial results from a three-round Delphi study].

    Science.gov (United States)

    Behmann, M; Jünger, S; Radbruch, L; Schneider, N

    2011-05-01

    Recently, six key targets for public health initiatives to improve palliative care in Germany were defined. This article reports the initial results of a follow-up study aiming at developing concrete measures to achieve these targets. We carried out a three-round Delphi study with stakeholders acting on the meso- and macro-levels of the German healthcare system (e.g., representatives of patient organizations, health insurance funds, politics, medical and nursing associations). In the first Delphi round, participants proposed measures to achieve the six key targets using free-text answers. The answers were analyzed with a qualitative-descriptive approach. In total, 107 stakeholders responded to the first Delphi round. After data reduction, 37 measures were extracted and grouped into six major categories: family carers, qualification, quality, public relations, services, and coordination. The range of measures on the different levels of policy, health care, and education presents a substantiated basis for the elaboration of targeted public health action plans to improve palliative care. Prioritization of measures in the second and third Delphi rounds will provide empirical support for decision making.

  13. Public Policies for ICT Update In Business: Some Key Indicators for Spain in the European Area

    Directory of Open Access Journals (Sweden)

    José Luis Vázquez

    2013-08-01

    Full Text Available Purpose—Based on the new face of business in the twenty first century, this general review is aimed at analyzing the use of information and communication technologies (ICT as social technologies by Spanish enterprises in the European context, as a result of recent policy frameworks set at communitarian and national levels.Design/methodology/approach—The paper reviews the guidelines marked by European common policies with regards to ICT update in business, just as the translation of such standards in the Spanish area. From this framework, implications of ICT adoption in the social relationships with consumers, employees, business partners and public authorities are analyzed by providing some figures in the Spanish context in comparison with the European average.Findings—The analysis supports a positive effect of national policies on Spanish enterprises’ use of social technologies in the interactions with their internal and external stakeholders, while some differences can be reported attending size and sector criteria. In this respect, ICT penetration seems to be widespread in Spanish enterprises longer than ten employees, specially within informatics, telecommunications and audiovisuals, whereas automation of interactions is moderated in micro-enterprises in the manufacture, building, retailing, and transportation sectors.Research limitations/implications—The paper offers a general overview of the use of ICT as social technologies in Spanish enterprises based on public reports. However, further research should be oriented to analyze more in deep the impact of public policies on ICT adoption and usage in business, by explaining their determining factors and comparing different clusters of counties and major regions of the world.Practical implications—The analysis reported point to the need of reinforcing the Spanish positioning in the ICT European sector in the long term. In this sense, future policy measures should be devoted to

  14. Public Policies for ICT Update In Business: Some Key Indicators for Spain in the European Area

    Directory of Open Access Journals (Sweden)

    Ana Lanero

    2011-08-01

    Full Text Available Purpose—Based on the new face of business in the twenty first century, this general review is aimed at analyzing the use of information and communication technologies (ICT as social technologies by Spanish enterprises in the European context, as a result of recent policy frameworks set at communitarian and national levels. Design/methodology/approach—The paper reviews the guidelines marked by European common policies with regards to ICT update in business, just as the translation of such standards in the Spanish area. From this framework, implications of ICT adoption in the social relationships with consumers, employees, business partners and public authorities are analyzed by providing some figures in the Spanish context in comparison with the European average.Findings—The analysis supports a positive effect of national policies on Spanish enterprises’ use of social technologies in the interactions with their internal and external stakeholders, while some differences can be reported attending size and sector criteria. In this respect, ICT penetration seems to be widespread in Spanish enterprises longer than ten employees, specially within informatics, telecommunications and audiovisuals, whereas automation of interactions is moderated in micro-enterprises in the manufacture, building, retailing, and transportation sectors.Research limitations/implications—The paper offers a general overview of the use of ICT as social technologies in Spanish enterprises based on public reports. However, further research should be oriented to analyze more in deep the impact of public policies on ICT adoption and usage in business, by explaining their determining factors and comparing different clusters of counties and major regions of the world.Practical implications—The analysis reported point to the need of reinforcing the Spanish positioning in the ICT European sector in the long term. In this sense, future policy measures should be devoted to

  15. On the Ergodic Secret-Key Agreement over Spatially Correlated Multiple-Antenna Channels with Public Discussion

    KAUST Repository

    Zorgui, Marwen

    2015-09-28

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. We prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Moreover, we analyze the impact of correlation matrices on the system performance. Finally, we study the system’s performance in the two extreme power regimes. In the high-power regime, we provide closed-form expressions of the gain/loss due to correlation. In the low signal-to-noise ratio (SNR) regime, we investigate the energy efficiency of the system by determining the minimum energy required for sharing a secret-key bit and the wideband slope while highlighting the impact of correlation matrices.

  16. An evaluation framework for pre-distribution strategies of certificates in VANETs

    NARCIS (Netherlands)

    Feiri, Michael; Petit, Jonathan; Kargl, Frank

    2014-01-01

    Security and privacy in vehicular communication are expected to be ensured by the pervasive use of pseudonymous certificates and signed messages. The design and establishment of necessary public key infrastructure and hierarchies of cer- tificate authorities is ongoing in industry consortia, such as

  17. Key aspects of a Flemish system to safeguard public health interests in case of chemical release incidents.

    Science.gov (United States)

    Smolders, Roel; Colles, Ann; Cornelis, Christa; Van Holderbeke, Mirja; Chovanova, Hana; Wildemeersch, Dirk; Mampaey, Maja; Van Campenhout, Karen

    2014-12-15

    Although well-established protocols are available for emergency services and first-responders in case of chemical release incidents, a well-developed system to monitor and safeguard public health was, until recently, lacking in Flanders. We therefore developed a decision support system (DSS) to aid public health officials in identifying the appropriate actions in case of incidents. Although the DSS includes human biomonitoring as one of its key instruments, it also goes well beyond this instrument alone. Also other, complementary, approaches that focus more on effect assessment using in vitro toxicity testing, indirect exposures through the food chain, and parallel means of data collection (e.g. through ecosurveillance or public consultation), are integrated in the Flemish approach. Even though the DSS is set up to provide a flexible and structured decision tree, the value of expert opinion is deemed essential to account for the many uncertainties associated with the early phases of technological incidents. When the DSS and the associated instruments will be fully operational, it will provide a valuable addition to the already available protocols, and will specifically safeguard public health interests.

  18. What are the key organisational capabilities that facilitate research use in public health policy?

    Science.gov (United States)

    Huckel Schneider, Carmen; Campbell, Danielle; Milat, Andrew; Haynes, Abby; Quinn, Emma

    2014-11-28

    Literature about research use suggests that certain characteristics or capabilities may make policy agencies more evidence attuned. This study sought to determine policy makers' perceptions of a suite of organisational capabilities identified from the literature as potentially facilitating research uptake in policy decision making. A literature scan identified eight key organisational capabilities that support research use in policy making. To determine whether these capabilities were relevant, practical and applicable in real world policy settings, nine Australian health policy makers were consulted in September 2011. We used an open-ended questionnaire asking what facilitates the use of research in policy and program decision making, followed by specific questions rating the proposed capabilities. Interviews were transcribed and the content analysed. There was general agreement that the capabilities identified from the literature were relevant to real world contexts. However, interviewees varied in whether they could provide examples of experiences with the capabilities, how essential they considered the different capabilities to be and how difficult they considered the capabilities were to achieve. Efforts to improve the use of research in policy decision making are likely to benefit from targeting multiple organisational capabilities, including staff skills and competence, tools such as templates and checklists to aid evidence use and leadership support for the use of research in policy development. However, such efforts should be guided by an understanding of how policy agencies use evidence and how they view their roles, and external factors such as resource constraints and availability of appropriate research.

  19. Public health and social injustice are the key issues for the decriminalization of abortion in Mexico.

    Science.gov (United States)

    1994-01-01

    Although the Second National Abortion Survey Gallup found that 88% of Mexicans believe abortion should be a woman's choice and 77% think the decriminalization of abortion would substantially reduce maternal mortality, abortion in Mexico remains governed by a 1931 criminal code. The survey was initiated by the Information and Reproductive Choice Group to provide information for the 1994 national debate on abortion. Supporters of legal abortion note that poor women resort to unsafe pregnancy terminations without regard to the criminal status of abortion. According to Patricia Mercado, co-founder of the Reproductive Choice Group, "You can be against abortion, but still allow it to be decriminalized. In other words, criminalization does not prevent women from having abortions, it only makes then have then in bad conditions. The idea is that women should be able to decide freely without risking problems of health and social justice." Despite public support for abortion legalization, survey results indicate widespread fear about acknowledging the existence of clandestine abortion. An estimated 1-2 million illegal abortions occur each year in Mexico, yet only 26% of survey respondents would admit to knowing a woman who had undergone illegal abortion.

  20. La politique qualité de la certification des comptes publics. Le cas de la Cour des comptes

    OpenAIRE

    Portal, Marine

    2009-01-01

    This research concerns the quality of the public accounts financial audit and more specifically the quality policy of this financial audit carries out by the Cour des comptes. The context is characterized by an increase of demands concerning the quality of financial and accounting information. The accounting and budgetary reform in France, generated by the LOLF 2001, is changing deeply performance of public management and accountancy by emphasizing transparence and quality for information, tw...

  1. 42 CFR 493.53 - Notification requirements for laboratories issued a certificate for provider-performed microscopy...

    Science.gov (United States)

    2010-10-01

    ... certificate for provider-performed microscopy (PPM) procedures. 493.53 Section 493.53 Public Health CENTERS... CERTIFICATION LABORATORY REQUIREMENTS Registration Certificate, Certificate for Provider-performed Microscopy... certificate for provider-performed microscopy (PPM) procedures. Laboratories issued a certificate for...

  2. 基于Chebyshev的概率公钥密码体制%Probabilistic public-key cryptosystem based on Chebyshev

    Institute of Scientific and Technical Information of China (English)

    程学海; 徐江峰

    2013-01-01

    This paper introduced the definition and the properties of Chebyshev polynomial.According to the deterministic public-key cryptosystem of Chebyshev polynomial,found that it couldn't resist chosen cipher-text attacks.Combining with the security model against chosen cipher-text attacks,this paper proposed the probabilistic public-key cryptosystem of Chebyshev polynomial.The analysis show that the proposed cryptosystem is correct.Through the result of the reduction proof,the proposed cryptosystem can resist the adaptive chosen cipher-text attacks and has the IND-CCA2 security.%介绍了Chebyshev多项式的定义和相关性质,针对确定性Chebyshev多项式公钥密码体制进行了研究,发现其不能抵抗选择密文攻击.结合抵抗选择密文攻击的安全模型,提出了基于有限域的Chebyshev多项式的概率公钥密码体制,分析结果表明该密码体制是正确的.通过归约证明,该密码体制能够抵挡适应性选择密文攻击,具有抵抗选择密文攻击的IND-CCA2安全性.

  3. Secret-key agreement over spatially correlated fast-fading multiple-antenna channels with public discussion

    KAUST Repository

    Zorgui, Marwen

    2015-06-14

    We consider secret-key agreement with public discussion over multiple-input multiple-output (MIMO) Rayleigh fast-fading channels under correlated environment. We assume that transmit, legitimate receiver and eavesdropper antennas are correlated. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge while the transmitter has only knowledge of the correlation matrices. First, we derive the expression of the secret-key capacity under the considered setup. Then, we prove that the optimal transmit strategy achieving the secret-key capacity consists in transmitting independent Gaussian signals along the eingenvectors of the transmit correlation matrix. The powers allocated to each channel mode are determined as the solution to a numerical optimization problem that we derive. A necessary and sufficient condition for beamforming (i.e., transmitting along the strongest channel mode) to be capacity-achieving is derived. Finally, we analyze the impact of correlation matrices on the system performance and provide closed-form expressions of the gain/loss due to correlation in the high power regime.

  4. Drinking Water Operator Certification and Certificate to Operate Criteria/Requirements for US Navy Overseas Drinking Water Systems

    Science.gov (United States)

    2012-05-22

    records) Definitions based on USEPA’s Guidance Manual for Conducting Sanitary Surveys 10 Certificate to Operate ( CTO ) Based on Sanitary...Topics For discussion •Bottom Line Up Front (BLUF) •Background •Key Elements of Plan of Action •Certificate to Operate ( CTO ) •Operator Certification...are the Certificate to Operate ( CTO ) and Operator training and certification  There have been a number of challenges; namely with operator

  5. 42 CFR 403.235 - Review and certification of policies.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Review and certification of policies. 403.235 Section 403.235 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN... Certification Program: General Provisions § 403.235 Review and certification of policies. (a) CMS will...

  6. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal - a case study from health science.

    Science.gov (United States)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become

  7. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science

    Science.gov (United States)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    Unique identifiers (UID) are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI), incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of UIDs may become

  8. An Investigation of the Reliability of Marking of the Key Stage 2 National Curriculum English Writing Tests in England

    Science.gov (United States)

    He, Qingping; Anwyll, Steve; Glanville, Matthew; Deavall, Angela

    2013-01-01

    Background: Although there has been considerable research into the reliability of marking for the Key Stage 3 (KS3) National Curriculum tests (NCTs) and public examinations such as the General Certificate of Secondary Education examinations (GCSEs) in England, little is understood about the level of reliability of marking of the Key Stage 2 (KS2)…

  9. Using IRT Approach to Detect Gender Biased Items in Public Examinations: A Case Study from the Botswana Junior Certificate Examination in Mathematics

    Science.gov (United States)

    Adedoyin, O. O.

    2010-01-01

    This is a quantitative study, which attempted to detect gender bias test items from the Botswana Junior Certificate Examination in mathematics. To detect gender bias test items, a randomly selected sample of 4000 students responses to mathematics paper 1 of the Botswana Junior Certificate examination were selected from 36,000 students who sat for…

  10. Multimode-multivariate public key cryptosystem%多模式多变量公钥密码体制

    Institute of Scientific and Technical Information of China (English)

    孙小雁; 张茂胜

    2012-01-01

    A multimode-multivariate public key cryptosystem is developed for resisting the quantum algorithm. Since quantum computers are not efficient to solve multivariate polynomial problems, the multivariate public key cryptosystem is secure. In order to improve the computational efficiency, the branching modification is used. During the process of every branch, the plus modifier, minus modifier and iteration are combined. Analysis results show that the proposed scheme can resist known types of attacks. And thus it can be applied to encryption/decryption, signature and integrity.%针对量子计算机对公钥密码体制的挑战,提出一种能抵抗量子算法的多模式多变量公钥密码算法.量子计算机在解决多变量多项式问题并无高效算法,在传统多变量公钥密码体制的基础上,使用多分支模式,在分支内部采用加模式、减模式和迭代模式,增强了多变量公钥密码体制的安全性.通过分析各种常见攻击的复杂度,多模式多变量公钥密码体制能有效抵抗各种攻击,可以应用于加解密、签名和数据完整性验证.

  11. PUBLIC KEY INFRASTRUCTURE (PKI)

    Data.gov (United States)

    Federal Laboratory Consortium — Common Access Card (CAC)Enterprise Testing Overview:Established in 2003Performs test and evaluations of the DOD PKI CAC issuance systems from an enterprise level all...

  12. PUBLIC KEY INFRASTRUCTURE (PKI)

    Data.gov (United States)

    Federal Laboratory Consortium — Common Access Card (CAC) Enterprise Testing Overview: Established in 2003 Performs test and evaluations of the DOD PKI CAC issuance systems from an enterprise level...

  13. Public assessment of key performance indicators of healthcare in a Canadian province: the effect of age and chronic health problems.

    Science.gov (United States)

    Nurullah, Abu Sadat; Northcott, Herbert C; Harvey, Michael D

    2014-01-15

    This study explores the effect of age and chronic conditions on public perceptions of the health system, as measured by the Key Performance Indicators (KPIs) of healthcare, in the province of Alberta in Canada. Drawing from data collected by Government of Alberta's Department of Health and Wellness, this research examines two key questions: (1) Do people in the 65+ age group rate the KPIs of healthcare (i.e., availability, accessibility, quality, outcome, and satisfaction) more favorably compared to people in younger age groups in Alberta? (2) Does the rating of KPIs of healthcare in Alberta vary with different chronic conditions (i.e., no chronic problem, chronic illnesses without pain, and chronic pain)? The findings indicate that people in the older age group tend to rate the KPIs of healthcare more favorably compared to younger age groups in Alberta, net of socio-demographic factors, self-reported health status, and knowledge and utilization of health services. However, people experiencing chronic pain are less likely to rate the KPIs of healthcare favorably compared to people with no chronic health problem in Alberta. Discussion includes implications of the findings for the healthcare system in the province.

  14. Certificateless Public Auditing Protocol with Constant Verification Time

    OpenAIRE

    Dongmin Kim; Ik Rae Jeong

    2017-01-01

    To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI), they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditin...

  15. Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2012-02-01

    Full Text Available Certificate-based encryption (CBE is a new public key encryption paradigm which combines traditional PKI-based public-key encryption (PKE and identity-based encryption (IBE, and preserves some of their most attractive features. CBE provides an efficient implicit certificate mechanism and allows a periodical update of certificate status. It eliminates third-party queries for the certificate status and simplifies the certificate revocation problem in the traditional PKI, while it solves the key escrow problem and the key distribution problem inherent in IBE. In this paper, we propose a new generic construction of CBE schemes from PKE and IBE, and prove it to be CCA-secure in the standard model. In our construction, we use an efficient one-time simulation-sound adaptive NIZK proof system as the security enhancing building block to guarantee the CCA-security of the generated CBE schemes. When compared to the previous method, the security requirements of the primitive encryption schemes in our construction are much weaker and the performance of the generated CBE schemes from our construction is much more efficient.

  16. Investigating weaknesses in Android certificate security

    Science.gov (United States)

    Krych, Daniel E.; Lange-Maney, Stephen; McDaniel, Patrick; Glodek, William

    2015-05-01

    Android's application market relies on secure certificate generation to establish trust between applications and their users; yet, cryptography is often not a priority for application developers and many fail to take the necessary security precautions. Indeed, there is cause for concern: several recent high-profile studies have observed a pervasive lack of entropy on Web-systems leading to the factorization of private keys.1 Sufficient entropy, or randomness, is essential to generate secure key pairs and combat predictable key generation. In this paper, we analyze the security of Android certificates. We investigate the entropy present in 550,000 Android application certificates using the Quasilinear GCD finding algorithm.1 Our results show that while the lack of entropy does not appear to be as ubiquitous in the mobile markets as on Web-systems, there is substantial reuse of certificates only one third of the certificates in our dataset were unique. In other words, we find that organizations frequently reuse certificates for different applications. While such a practice is acceptable under Google's specifications for a single developer, we find that in some cases the same certificates are used for a myriad of developers, potentially compromising Android's intended trust relationships. Further, we observed duplicate certificates being used by both malicious and non-malicious applications. The top 3 repeated certificates present in our dataset accounted for a total of 11,438 separate APKs. Of these applications, 451, or roughly 4%, were identified as malicious by antivirus services.

  17. 42 CFR 8.11 - Opioid treatment program certification.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Opioid treatment program certification. 8.11... PROVISIONS CERTIFICATION OF OPIOID TREATMENT PROGRAMS Certification and Treatment Standards § 8.11 Opioid... Substances Act (21 U.S.C. 823(g)(1)) to dispense opioid drugs in the treatment of opioid addiction. An OTP...

  18. 42 CFR 403.245 - Loss of certification.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Loss of certification. 403.245 Section 403.245...: General Provisions § 403.245 Loss of certification. (a) A policy loses certification if— (1) The insuring... policy fails to meet the requirements specified in § 403.232(a); or (ii) The insuring organization...

  19. Certificate Suspension and Revocation. School Management Advisor, Issue 28.

    Science.gov (United States)

    North Carolina State Dept. of Public Instruction, Raleigh.

    This document describes the legal requirements for certificate suspension and revocation of North Carolina public-school teachers. Associated with its ability to administer teacher certification in the state, the State Board of Education also has the authority to suspend or revoke certificates. A question-and-answer section addresses issues of…

  20. 45 CFR Appendix A to Part 93 - Certification Regarding Lobbying

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Certification Regarding Lobbying A Appendix A to... ON LOBBYING Pt. 93, App. A Appendix A to Part 93—Certification Regarding Lobbying Certification for... Standard Form-LLL, “Disclosure Form to Report Lobbying,” in accordance with its instructions. (3)...

  1. 45 CFR Appendix A to Part 1230 - Certification Regarding Lobbying

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Certification Regarding Lobbying A Appendix A to... AND COMMUNITY SERVICE NEW RESTRICTIONS ON LOBBYING Pt. 1230, App. A Appendix A to Part 1230—Certification Regarding Lobbying Certification for Contracts, Grants, Loans, and Cooperative Agreements...

  2. 45 CFR Appendix A to Part 1158 - Certification Regarding Lobbying

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Certification Regarding Lobbying A Appendix A to... ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS NEW RESTRICTIONS ON LOBBYING Pt. 1158, App. A Appendix A to Part 1158—Certification Regarding Lobbying Certification for Contracts, Grants, Loans,...

  3. 43 CFR Appendix A to Part 18 - Certification Regarding Lobbying

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Certification Regarding Lobbying A... LOBBYING Pt. 18, App. A Appendix A to Part 18—Certification Regarding Lobbying Certification for Contracts...-LLL, “Disclosure Form to Report Lobbying,” in accordance with its instructions. (3) The...

  4. 45 CFR Appendix A to Part 1168 - Certification Regarding Lobbying

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Certification Regarding Lobbying A Appendix A to... ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE HUMANITIES NEW RESTRICTIONS ON LOBBYING Pt. 1168, App. A Appendix A to Part 1168—Certification Regarding Lobbying Certification for Contracts,...

  5. The Homomorphism Analysis of Public Key Cryptosystem%公钥密码体制的同态性分析

    Institute of Scientific and Technical Information of China (English)

    闫世斗; 刘念; 李子臣

    2012-01-01

    Homomorphic encryption algorithm is based on the concept of homomorphism, which is a subset ot the homomorphism. Homomorphic encryption technology can do the operation to ciphertext directly, the op- eration results can be encrypted automatically, and the technology has a very broad application in secure multi - party computation, data encryption, electronic voting and other fields. A Homomorphic property in- cludes additively homomorphism, muhiplicatively homomorphism, and mixed multiplicatively homomor- phism. We study the homomorphic property of the three public key cryptosystem widely used now, and ana- lyze Pallier cryptosystem that meets additively homomorphism, which can provide theoretical basis and guid- ance to the follow - up study of fully homomorphic encryption algorithm.%同态加密算法是基于秘密同态的概念,是秘密同态的一个子集。同态加密技术可以对加密数据直接进行运算,并且运算结果也自动加密。正是基于此,使得同态加密技术在安全多方计算、数据库加密、电子投票等领域具有广泛的应用。同态特性主要包括加法特性、乘法特性、混合乘法特性。文章对目前广泛应用的三大公钥密码体制的同态特性进行了分析,并对满足加法同态的Pallier密码体制进行了研究。为后续研究全同态加密算法提供理论基础和方法指导。

  6. 42 CFR 493.1775 - Standard: Inspection of laboratories issued a certificate of waiver or a certificate for provider...

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Standard: Inspection of laboratories issued a... (CONTINUED) STANDARDS AND CERTIFICATION LABORATORY REQUIREMENTS Inspection § 493.1775 Standard: Inspection of laboratories issued a certificate of waiver or a certificate for provider-performed microscopy procedures....

  7. 42 CFR 486.312 - De-certification.

    Science.gov (United States)

    2010-10-01

    ...) STANDARDS AND CERTIFICATION CONDITIONS FOR COVERAGE OF SPECIALIZED SERVICES FURNISHED BY SUPPLIERS... other information as CMS may require through publication in local newspapers in the service area. In...

  8. Perspectives on key principles of generalist medical practice in public service in sub-saharan africa: a qualitative study

    Directory of Open Access Journals (Sweden)

    Downing Raymond V

    2011-07-01

    Full Text Available Abstract Background The principles and practice of Family Medicine that arose in developed Western countries have been imported and adopted in African countries without adequate consideration of their relevance and appropriateness to the African context. In this study we attempted to elicit a priori principles of generalist medical practice from the experience of long-serving medical officers in a variety of African counties, through which we explored emergent principles of Family Medicine in our own context. Methods A descriptive study design was utilized, using qualitative methods. 16 respondents who were clinically active medical practitioners, working as generalists in the public services or non-profit sector for at least 5 years, and who had had no previous formal training or involvement in academic Family Medicine, were purposively selected in 8 different countries in southern, western and east Africa, and interviewed. Results The respondents highlighted a number of key issues with respect to the external environment within which they work, their collective roles, activities and behaviours, as well as the personal values and beliefs that motivate their behaviour. The context is characterized by resource constraints, high workload, traditional health beliefs, and the difficulty of referring patients to the next level of care. Generalist clinicians in sub-Saharan Africa need to be competent across a wide range of clinical disciplines and procedural skills at the level of the district hospital and clinic, in both chronic and emergency care. They need to understand the patient's perspective and context, empowering the patient and building an effective doctor-patient relationship. They are also managers, focused on coordinating and improving the quality of clinical care through teamwork, training and mentoring other health workers in the generalist setting, while being life-long learners themselves. However, their role in the community, was

  9. Introduction of Renal Key Performance Indicators Associated with Increased Uptake of Peritoneal Dialysis in a Publicly Funded Health Service.

    Science.gov (United States)

    Toussaint, Nigel D; McMahon, Lawrence P; Dowling, Gregory; Holt, Stephen G; Smith, Gillian; Safe, Maria; Knight, Richard; Fair, Kathleen; Linehan, Leanne; Walker, Rowan G; Power, David A

    2017-01-01

    ♦ BACKGROUND: Increased demand for treatment of end-stage kidney disease has largely been accommodated by a costly increase in satellite hemodialysis (SHD) in most jurisdictions. In the Australian State of Victoria, a marked regional variation in the uptake of home-based dialysis suggests that use of home therapies could be increased as an alternative to SHD. An earlier strategy based solely on increased remuneration had failed to increase uptake of home therapies. Therefore, the public dialysis funder adopted the incidence and prevalence of home-based dialysis therapies as a key performance indicator (KPI) for its health services to encourage greater uptake of home therapies. ♦ METHODS: A KPI data collection and bench-marking program was established in 2012 by the Victorian Department of Health and Human Services, with data provided monthly by all renal units in Victoria using a purpose-designed website portal. A KPI Working Group was responsible for analyzing data each quarter and ensuring indicators remained accurate and relevant and each KPI had clear definitions and targets. We present a prospective, observational study of all dialysis patients in Victoria over a 4-year period following the introduction of the renal KPI program, with descriptive analyses to evaluate the proportion of patients using home therapies as well as home dialysis modality survival. ♦ RESULTS: Following the introduction of the KPI program, the net growth of dialysis patient numbers in Victoria remained stable over 4 years, at 75 - 80 per year (approximately 4%). However, unlike the previous decade, about 40% of this growth was through an increase in home dialysis, which was almost exclusively peritoneal dialysis (PD). The increase was identified particularly in the young (20 - 49) and the elderly (> 80). Disappointingly, however, 67% of these incident patients ceased PD within 2 years of commencement, 46% of whom transferred to SHD. ♦ CONCLUSIONS: Introduction of a KPI program

  10. The El-Gamal AA_{\\beta} Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem

    CERN Document Server

    Ariffin, Muhammad Rezal Kamel; Ghani, Aniza Abdul; Atan, Kamel Ariffin Mohd; Abu, Nor Azman

    2010-01-01

    The El-Gamal AA_{\\beta} Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_{\\beta}-function. The AA_{\\beta}-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \\equiv M^e (mod N) and M \\equiv C^d (mod N) in the RSA cryptosystem. It was also motivated by the add and double point operation E=kG in the elliptic curve cryptosystem. The hard mathematical problem surrounding this newly designed asymmetric cryptosystem is the NP-complete problem known as the subset sum problem. The El-Gamal AA_{\\beta} Public Key Cryptosystem mimics the El-Gamal Cryptosystem and the Elliptic Curve Cryptosystem by sending a two parameter ciphertext to the recipient.

  11. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor

    2012-01-01

    show that the distribution of Fourier coefficients for the cipher over all keys is close to ideal. Lastly, we define a practical instance of the construction with t = 2 using AES referred to as AES2. Any attack on AES2 with complexity below 285 will have to make use of AES with a fixed known key...

  12. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor

    2012-01-01

    This paper considers—for the first time—the concept of key-alternating ciphers in a provable security setting. Key-alternating ciphers can be seen as a generalization of a construction proposed by Even and Mansour in 1991. This construction builds a block cipher PX from an n-bit permutation P and...

  13. 公安网络舆情分析中的关键技术研究%Research on key technologies of public security network public opinion analysis

    Institute of Scientific and Technical Information of China (English)

    李燕

    2015-01-01

    Faced with online public opinions, It’s a practical problem which must be deeply studied and confronted for the public security organs on how to find , collect, analyze and deal with these opinions timely, and effectively enhance the credibility of the public security organization. Therefore, this article will be focused on a study related to public security methods and techniques involved in the network public opinion analysis.%面对网络舆情,公安机关如何及时发现并采集、分析并处理,切实提升公安机关的公信力,是公安机关必须深入研究和对待的现实问题。本文重点就公安网络舆情分析中涉及的相关方法和技术展开研究。

  14. Research of security university E-government based on public key infrastructure%公钥基础设施的高校电子政务安全研究

    Institute of Scientific and Technical Information of China (English)

    黄兰英; 叶从欢

    2013-01-01

    为了解决高校电子政务中的身份认证、访问控制、信息安全等安全问题,提出了一种基于公钥基础设施(PKI)核心技术的高校电子政务模型.该模型采用桥认证(CA)结构建立PKI信任机制,在各部门内部使用分级的CA认证,各部门之间通过中心CA进行桥接CA交叉认证;采用轻量目录访问协议(LDAP)建立PKI证书库,以目录复制(Replica)实现CA对主从LDAP的数据一致性,提高使用者的身份有效认证.该模型还采用角色及权限访问控制(RBAC)进行用户合法安全访问控制,在用户和访问权限之间引入角色,用户通过角色分配的权限来访问系统资源.此模型在实践中得以验证,符合安全要求.%A model based on the core technology in the public key infrastructure (PKI) was introduced to resolve the safety problems in the E-government affairs of colleges and universities, such as identity authentication, access control and information safety. A PKI trust mechanism was established by using the bridge certificate authentication (CA), a hierarchical CA in every internal department and the bridge CA to cross authentication between various departments through a center CA were used. A PKI certificate base was established by using the lightweight directory access protocol (LDAP) , which used directory replication to realize master-slave LDAP data consistency, so the availability of identity authentication of users was enhanced. The legal safety access of users was controlled by using role based access control (RBAC) , the role between the user and the access was introduced , then the user accessed system resources through the permissions granted to the roles. The model is proved in practice according to the safety requests and is useful for the development of the E-government affairs of colleges and universities.

  15. Challenges, alternatives, and paths to sustainability: better public health promotion using social networking pages as key tools.

    Science.gov (United States)

    Zaidan, A A; Zaidan, B B; Kadhem, Z; Larbani, M; Lakulu, M B; Hashim, M

    2015-02-01

    This paper discusses the possibility of promoting public health and implementing educational health services using Facebook. We discuss the challenges and strengths of using such a platform as a tool for public health care systems from two different perspectives, namely, the view of IT developers and that of physicians. We present a new way of evaluating user interactivity in health care systems from tools provided by Facebook that measure statistical traffic in the Internet. Findings show that Facebook is a very promising tool in promoting e-health services in Web 2.0. Results from statistical traffic show that a Facebook page is more efficient than other pages in promoting public health.

  16. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal

    DEFF Research Database (Denmark)

    Madsen, Heidi Holst; Madsen, Dicte; Gauffriau, Marianne

    2016-01-01

    , and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character...... recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation...

  17. Certification of ICTs in Elections

    DEFF Research Database (Denmark)

    Schürmann, Carsten; Barrat, Jordi; Bolo, Eden

    2015-01-01

    voting or tabulation systems. The key elements of quality control are certification and evaluation. Certification refers to the confirmation proof of compliance with a given standard. Evaluation is the most labour intensive part of the quality control process during which the requirements, designs......, hardware, firmware, software, networks and operational contexts are examined for faults. An election technology can only be certified by third-party reviewers who are accredited to assess compliance with a standard. An EMB should consider quality control early in the process of introducing new technologies......, starting during the feasibility study, and especially if it is bound by law to provide such a certification. The evaluation reports and related documents can also be used to increase the transparency of the election, improve the dialogue between EMBs and voters, and increase the EMB’s credibility....

  18. 可撤销的公钥加密方案的形式化分析%Revocable Public-Key Cryptosystems Formal Analysis

    Institute of Scientific and Technical Information of China (English)

    于瑞琴

    2011-01-01

    通常的密码系统,IBE或者PKI都必须提供从系统中撤销用户私钥的途径,同样PEKS也应该提供撤销陷门的方式.本文研究了可高效撤销的无需安全信道的带关键字搜索公钥加密方案的形式化定义及安全模型.基于BDH问题,可证明方案的安全性.%Any setting,Public-key Infrastructure or Identity-Based.Must provide a means to revoke users from the system.Efficient revocation is a well-studied problem in the traditional Public-Key Infrastructure or Identity-Based Encryption.We propose revocable public key encryption with Key words search scheme of formalized definition and the security model in the paper.Based on bilinear dilinear diffie-hellman,the security of the scheme can be proved.

  19. 基于身份的一次性盲公钥方案%One-off Blind Public Key Scheme Based on Identity

    Institute of Scientific and Technical Information of China (English)

    赵伟艇; 申远

    2012-01-01

    在现有方案的基础上,通过分析超椭圆曲线双线性对和基于身份的特点,给出了一个改进的基于身份的一次性盲公钥方案.该方案由用户和可信中心共同完成用户密钥的生成,克服了密钥托管问题,避免了由可信中心进行密钥管理所产生的安全隐患.新构造的方案能够抵抗伪造性攻击,具有不可欺骗性,又保证了一次性盲公钥的独立性,是安全可靠的.而且方案中用户在通讯时可以使用不同的公钥,解决了Internet通信中的匿名认证问题,实现了用户隐私的有效保护.%By analyzing the characteristic of the bilinear pairings on hyper-elliptic curves and identity-based cryptography, an improved one-off blind public key scheme based on the existing schemes is proposed. The scheme solves the problem of the key escrow by users and trust center generated encryption key, so it avoids security problems caused by single independent key management. The scheme is robust a-gainst the Forgery attack and ensures the independence of user's public key. This scheme is satisfied. And user's public key is different ever-y time, it can be applied to implementing internet anonymous attestation for privacy protection.

  20. Human Systems Integration: Unmanned Aircraft Control Station Certification Plan Guidance

    Science.gov (United States)

    2005-01-01

    This document provides guidance to the FAA on important human factors considerations that can be used to support the certification of a UAS Aircraft Control Station (ACS). This document provides a synopsis of the human factors analysis, design and test activities to be performed to provide a basis for FAA certification. The data from these analyses, design activities, and tests, along with data from certification/qualification tests of other key components should be used to establish the ACS certification basis. It is expected that this information will be useful to manufacturers in developing the ACS Certification Plan,, and in supporting the design of their ACS.

  1. ELGamal public key cryptosystem based on multiplicative group Zp*%基于乘法群Zp*的ELGamal公钥密码系统

    Institute of Scientific and Technical Information of China (English)

    孙立宏

    2011-01-01

    为了解决发送方与接收方不能识别对方身份的问题,在研究E1Gamal密码体制的基础上,给出了一种基于乘法群Zn*的ELGamal公钥密码体制。结果表明:该算法可以实现通信双方的双向身份认证,有效地防止了攻击者冒充发送方伪造要发送的消息。同时该算法在通信过程中加入了可以追踪消息来源的信息,使得接收者可以对消息的真实性进行有效的验证。通过对消息的双重保护,该体制实现了在公开信道上的安全通信。%In the public key cryptography system, the sender encrypts the messages with the recipient's public key and the receiver decrypts them with their own secret key, which results in that the two sides are unable to recognize each other. In order to solve the problem above, an ELGamal public key cryptosystem based on multiplicative group Zp* has been presented in this paper. The bidirectional identity authentication between both communications sides are supplied in the proposed algorithm, which successfully prevents the attacker sending a forged message in the identity of sender. In addition, the algorithm also adds the information to track the sources of message in the communication process, which allows the message recipients verifying the authenticity of message effectively. The system implements a secured communication in the public channel through a dual protection on message.

  2. Monitoring Sustainability Certification of Bioenergy: Impacts of sustainability certification on bioenergy markets and trade

    NARCIS (Netherlands)

    Goh, C.S.; Junginger, H.M.; et al,; Goovaerts, L.

    2013-01-01

    At present numerous biomass and biofuel sustainability certification schemes are being developed or implemented by a variety of private and public organisations. Schemes are applicable to different feedstock production sectors (forests, agricultural crops), different bioenergy products (wood

  3. Monitoring Sustainability Certification of Bioenergy: Impacts of sustainability certification on bioenergy markets and trade

    NARCIS (Netherlands)

    Goh, C.S.; Junginger, H.M.; et al,; Goovaerts, L.

    2013-01-01

    At present numerous biomass and biofuel sustainability certification schemes are being developed or implemented by a variety of private and public organisations. Schemes are applicable to different feedstock production sectors (forests, agricultural crops), different bioenergy products (wood chips,

  4. First Chinese public hospital wins Joint Commission International accreditation: the Health Information Department played a key role in the process.

    Science.gov (United States)

    Shaffer, Audrey; Jun, Cheng Li

    2008-07-01

    Sir Run Run Shaw Hospital in Hangzhou, China spent five years preparing for a Joint Commission International accreditation survey. In March 2007 it became the first public hospital on the Chinese mainland to attain international accreditation. The Health Information Department, managed according to Western standards, played an integral role in preparing the hospital for the survey.

  5. Increasing certification through unit-based education.

    Science.gov (United States)

    Fischer-Cartlidge, Erica; Mahon, Suzanne

    2014-04-01

    Certification has been identified by multiple organizations as an important component and means of elevating the level of nursing care provided to patients and demonstrating to the public that the nursing staff has subspecialty knowledge. Certification may lead to improved patient satisfaction and outcomes as well as increased nurse satisfaction and retention. Despite the known potential benefits associated with certification, institutions struggle to improve certification rates. One possible method to overcome system barriers to certification is the implementation of a unit-based study course to prepare nurses for the Certified Breast Care Nurse (CBCN) examination. Data collected by an author-developed tool as one institution created and executed a unit-based study course suggest that such an approach increased certification rates and improved disease-specific knowledge and confidence among the staff, despite no official data existing on the tool's reliability and validity. Implementation of similar programs may be successful in improving certification at other institutions seeking to raise certification rates.

  6. Software Certification and Software Certificate Management Systems

    Science.gov (United States)

    Denney, Ewen; Fischer, Bernd

    2005-01-01

    Incremental certification and re-certification of code as it is developed and modified is a prerequisite for applying modem, evolutionary development processes, which are especially relevant for NASA. For example, the Columbia Accident Investigation Board (CAIB) report 121 concluded there is "the need for improved and uniform statistical sampling, audit, and certification processes". Also, re-certification time has been a limiting factor in making changes to Space Shuttle code close to launch time. This is likely to be an even bigger problem with the rapid turnaround required in developing NASA s replacement for the Space Shuttle, the Crew Exploration Vehicle (CEV). Hence, intelligent development processes are needed which place certification at the center of development. If certification tools provide useful information, such as estimated time and effort, they are more likely to be adopted. The ultimate impact of such a tool will be reduced effort and increased reliability.

  7. 42 CFR 403.239 - Submittal of material to retain certification.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Submittal of material to retain certification. 403.239 Section 403.239 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND... Certification Program: General Provisions § 403.239 Submittal of material to retain certification. (a)...

  8. Developing Key Performance Indicators to Measure the Effectiveness of Early Facilities Management Performance on BIM Governed Public Sector Projects

    OpenAIRE

    McAuley, Barry; Hore, Alan; West, Roger

    2015-01-01

    Governments across the globe are now recognising the need to take steps to better manage their property portfolios due to the escalating costs of operating these buildings over their lifetime. This has seen them turn towards innovative work practices and technologies offered by Building Information Modelling (BIM). It is now becoming increasingly evident that BIM can bring significant added value to the design, construction and most importantly to the operational life of a public sector devel...

  9. Dissemination of public health information: key tools utilised by the NECOBELAC network in Europe and Latin America

    Science.gov (United States)

    De Castro, Paola; Marsili, Daniela; Poltronieri, Elisabetta; Calderón, Carlos Agudelo

    2012-01-01

    Background Open Access (OA) to scientific information is an important step forward in communication patterns, yet we still need to reinforce OA principles to promote a cultural change of traditional publishing practices. The advantages of free access to scientific information are even more evident in public health where knowledge is directly associated with human wellbeing. Objectives An OA ‘consolidation’ initiative in public health is presented to show how the involvement of people and institutions is fundamental to create awareness on OA and promote a cultural change. This initiative is developed within the project NEtwork of COllaboration Between Europe and Latin American Caribbean countries (NECOBELAC), financed by the European Commission. Methods Three actions are envisaged: Capacity building through a flexible and sustainable training programme on scientific writing and OA publishing; creation of training tools based on semantic web technologies; development of a network of supporting institutions. Results In 2010–2011, 23 training initiatives were performed involving 856 participants from 15 countries; topic maps on scientific publication and OA were produced; 195 institutions are included in the network. Conclusions Cultural change in scientific dissemination practices is a long process requiring a flexible approach and strong commitment by all stakeholders. PMID:22630360

  10. Key Management and Authentication in Ad Hoc Network based on Mobile Agent

    Directory of Open Access Journals (Sweden)

    Yi Zhang

    2009-08-01

    Full Text Available Key management and authentication is important to security of Mobile Ad Hoc network (MANET. Based on the (t, n threshold cryptography, this paper introduced mobile agents to exchange private key and network topological information with nodes in the network. This method avoids a centralized certification authority to distribute the public keys and the certificates, thus enhances security. Carrying private key and some state variables, mobile agents navigate in the network according to visitsbalance policy, namely, node with the least visits would be first visited by mobile agent. Any t nodes in the network can cooperate to perform an authentication upon a new node wanting to join the network. Experimental results show that the mobile agent performs very well for improving the success ratio of authentication and enhance security while reducing the communication overhead and resource consumption.

  11. 77 FR 325 - Proposed Information Collection (Certification of Change or Correction of Name, Government Life...

    Science.gov (United States)

    2012-01-04

    ... Government Life Insurance policies. Affected Public: Individuals or households. Estimated Annual Burden: 20... information technology. Title: Certification of Change or Correction of Name, Government Life Insurance, VA... AFFAIRS Proposed Information Collection (Certification of Change or Correction of Name, Government...

  12. 77 FR 43077 - Federal Acquisition Regulation; Information Collection; North Carolina Sales Tax Certification

    Science.gov (United States)

    2012-07-23

    ... Regulation; Information Collection; North Carolina Sales Tax Certification AGENCY: Department of Defense (DOD... approved information collection requirement concerning North Carolina sales tax certification. Public...: Submit comments identified by Information Collection 9000- 0059, North Carolina Sales Tax...

  13. Key points for developing an international declaration on nursing, human rights, human genetics and public health policy.

    Science.gov (United States)

    Anderson, G; Rorty, M V

    2001-05-01

    Human rights legislation pertaining to applications of human genetic science is still lacking at an international level. Three international human rights documents now serve as guidelines for countries wishing to develop such legislation. These were drafted and adopted by the United Nations Educational, Scientific and Cultural Organization, the Human Genome Organization, and the Council of Europe. It is critically important that the international nursing community makes known its philosophy and practice-based knowledge relating to ethics and human rights, and contributes to the globalization of genetics. Nurses have particular expertise because they serve in a unique role at grass roots level to mediate between genetic science and its application to public health policies and medical interventions. As a result, nurses worldwide need to focus a constant eye on human rights ideals and interpret these within social, cultural, economic and political contexts at national and local levels. The purpose of this article is to clarify and legitimate the need for an international declaration on nursing, human rights, human genetics and public health policy. Because nurses around the world are the professional workforce by which genetic health care services and genetic research protocols will be delivered in the twenty-first century, members of the discipline of nursing need to think globally while acting locally. Above all other disciplines involved in genetics, nursing is in a good position to articulate an expanded theory of ethics beyond the principled approach of biomedical ethics. Nursing is sensitive to cultural diversity and community values; it is sympathetic to and can introduce an ethic of caring and relational ethics that listen to and accommodate the needs of local people and their requirements for public health.

  14. 7 CFR 1901.505 - Certificates of beneficial ownership in FmHA or its successor agency under Public Law 103-354 loans.

    Science.gov (United States)

    2010-01-01

    ... successor agency under Public Law 103-354 loans. 1901.505 Section 1901.505 Agriculture Regulations of the... ownership in FmHA or its successor agency under Public Law 103-354 loans. (a) Special trust of loans—(1) Establishment of special trusts. From time to time FmHA or its successor agency under Public Law 103-354...

  15. Innovative electronic publication in plant systematics: PhytoKeys and the changes to the “Botanical Code” accepted at the XVIII International Botanical Congress in Melbourne

    Directory of Open Access Journals (Sweden)

    W. John Kress

    2011-09-01

    Full Text Available PhytoKeys was established less than a year ago in response to four main publication challenges of our time: (1 the appearance of electronic publications as amendments or even alternatives to paper publications; (2 Open Access (OA as a new publishing model; (3 the linkage of electronic registers, indices, and aggregators, which summarize information on biological species through taxonomic names or their persistent identifiers; and (4 Web 2.0 technologies, which permit the semantic markup of, and semantic enhancements to, published biological texts. The appearance of the journal was concomitant with lively discussions on the validity of nomenclatural acts published electronically (Knapp and Wright 2010, Knapp et al. 2010, Penev et al. 2010, Chapman et al. 2010. At the XVIII International Botanical Congress in Melbourne in July 2011 (IBC 2011 these discussions culminated in the decision to amend the International Code of Botanical Nomenclature to allow electronic-only publishing of new taxa. Even before the end of the Congress and formal acceptance of the changes PhytoKeys was able to publish a report on the main outcomes of the Nomenclature Section on electronic publishing (Miller et al. 2011.

  16. Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Kumar Rana

    2011-03-01

    Full Text Available Securing mobile ad hoc networks (MANETs is a crucial task for their good deployments. One fundamental aspect of providing confidentiality and authentication is key management. While Public Key Infrastructure (PKI based solutions has provided these properties historically, MANETs are resource constrained and benefit from symmetric key encryption. In this paper, we proposed a certificateless efficient group key management scheme (CE-GKMS in MANETs for group confidentiality which uses identity based cryptography for secure multicast group communication. The scheme does not need PKI in which mobile nodes needs large storage to carry certificates and to perform public key cryptography based large computation. The scheme introduced a new idea of hiding the public keys and making them visible only to the trusted nodes which not only make it difficult for cryptanalyst to crack the private information but also permit to keep small value of encryption and decryption component causes asymmetric cryptography operation faster. For scalability and dynamic reconfigurability, we divide the network into groups. Leaders in these groups securely communicate with each other to agree on group key in response to membership change and member mobility-induced events. The performance results prove the effectiveness of our proposed key management scheme CE-GKMS.

  17. Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems.

    Science.gov (United States)

    Lin, Tsung-Hung; Lee, Tian-Fu

    2014-05-01

    Secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems enables two users only store their verifiers computed from their actual password in authentication server's database. Then the authentication server can verify the users' verifiers and help them to exchange electronic medical records or electronic health records securely and conveniently. This investigation presents an efficient and secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems. The proposed scheme does not use server's public keys and includes the key confirmation without extra numbers of messages and rounds. Compared to related verified-based approaches, the proposed scheme possesses higher security, has lower computational cost and fewer transmissions, and thus is suitable for the telecare medicine information systems.

  18. A parallel realization for LUC algorithm of public key cryptosystems%公钥加密算法LUC的并行实现方法

    Institute of Scientific and Technical Information of China (English)

    杜珍珍; 陆正福; 周同; 杨春尧

    2016-01-01

    LUC是基于数论的公钥密码体制,相比RSA公钥密码体制,具有能够抵抗共模攻击的优点。但LUC算法因实现难度大,运算时间长而难以用于实际加密。而影响其运算速度的主要因素是密钥长度和模幂算法。本文参考相关文献工作,得到将密钥进行分段计算的公式,而后利用LUC序列的性质将密钥进行分段计算,并在多核系统下实现了LUC并行算法,从而提高了LUC算法的执行效率。%The LUC algorithm based on the number theory is one of the public key encryption, which resists common modu-lus attack comparing with the RSA public cyptosystem. But it is difficult for practical encryption and decryption as LUC is a long time of computing task. The main factor that affects the calculation speed of LUC encryption is key length and mode power algorithm. Reviewed with related references in this paper, we deduced the expression which computed by key division segmenta-tion, then applying the mathematical properties of LUC sequences, and the LUC algorithm is computed by key division segmen-tation, which is executed parallelly by implemented on multi-core platform, consequently, the computation efficiency of LUC al-gorithm is improved.

  19. 城乡公交一体化规划的关键技术%Key Technology of Integrated Planning of Urban and Rural Public Transportation

    Institute of Scientific and Technical Information of China (English)

    王献香

    2014-01-01

    Integrated development of urban and rural passenger transport is the inevitability of the times, and it is the needs of China′s new urbanization development. Through the understanding of integration of urban and rural public transportation, the article analyzed the difference between the road passenger trans-port and public transport. Then it proposed key technologies of the urban and rural transit integrated plan-ning which are establishment of integrated rural hub system, integrated urban and rural public transporta-tion network structure, integration of urban and rural bus fare and sustainable public transport subsidy mechanism. At the same time, it studied the content of each key technology with cases.%统筹城乡客运发展是时代发展的必然性,也是我国新型城镇化发展的现实需要,通过对城乡公交一体化内涵的理解,对公路客运和公共交通之间差异性进行分析,提出城乡公交一体化规划关键技术,包括建立城乡一体的枢纽体系、城乡一体的线网结构、城乡一体票价体系和可持续的公交补贴机制,并结合案例对每项关键技术进行研究。

  20. Distributed certification application via a trusted dealer

    Institute of Scientific and Technical Information of China (English)

    刘端阳; 潘雪增; 平玲娣

    2003-01-01

    Distributed certification via threshold cryptography is much more secure than other ways to protect certification authority (CA) 's private key, and can tolerate some intrusions. As the original system such as ITTC, etc., is unsafe, inefficient and impracitcal in actual network environment, this paper brings up a new distributed certification scheme, which although it generates key shares concentratively, it updates key shares distributedly, and so, avoids single-point failure like ITTC. It not only enhances robustness with Feldman verification and SSL protocol, but can also change the threshold (t,k) flexibly and robustly, and so, is much more practical. In this work, the authors implement the prototype system of the new scheme and test and analyze its performance.

  1. Distributed certification application via a trusted dealer

    Institute of Scientific and Technical Information of China (English)

    刘端阳; 潘雪增; 平玲娣

    2003-01-01

    Distributed certification via threshold cryptography is much more secure than other ways to protect certification authority (CA) 's private key, and can tolerate some intrusions. As the original system such as ITTC, etc. , is unsafe, inefficient and impracitcal in actual network environment, this paper brings up a new distributed certification scheme, which although it generates key shares concentratively, it updates key shares distributedly, and so, avoids single-point failure like ITYC. It not only enhances robustness with Feldman verification and SSL protocol, but can also change the threshold ( t, k ) flexibly and robustly, and so, is muc hmore practical. In this work, the authors implement the prototype system of the new scheme and test and analyze its performance.

  2. New method to solve collusion attack and key collision in combined public key%解决组合公钥共谋攻击和密钥碰撞的新方法

    Institute of Scientific and Technical Information of China (English)

    LI Fang-wei; MA An-jun; ZHU Jiang; YU Hang

    2014-01-01

    The purpose of this paper is to solve the problem of collusion attack and key collision in combined public key crypto-system. First, for the linear collusion attacks, this paper proposed a new method to construct seed matrix, it made the sum of seeds gre%以解决组合公钥体制中共谋攻击和密钥碰撞问题为目的。首先,针对线性共谋攻击,提出了一种新的构造种子矩阵的方法,使得种子密钥和大于基点加法群的阶数,从而使密钥之间不能相互线性表示。其次在密钥的生产过程中,引入系数破坏了层不同和层互斥不同的关系,为解决选择共谋攻击提供了一种有效的方法,同时增强了抵御随机共谋攻击的能力。最后,在密钥产生的流程中,通过公钥对比来避免密钥碰撞,为解决密钥碰撞问题提出了一种新方法。

  3. A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier

    OpenAIRE

    Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa

    2009-01-01

    In IEEE ISI 2008, an anonymous attribute authentication scheme has been proposed using a self-blindable certificate scheme. This scheme enables the anonymity and certificate revocation. A Certificate Revocation List (CRL) is used in the revocation check. Even if an attacker can obtain a CRL, the attacker cannot execute the revocation check. This means that this scheme enables the designated revocation. However, this scheme is not secure, namely, a user can make a forged proof using a public v...

  4. Intrusion prevention and Message Authentication Protocol (IMAP using Region Based Certificate Revocation List Method in Vehicular Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    G. Anitha

    2014-05-01

    Full Text Available Vehicular Ad-hoc network uses some advanced Public Key Infrastructure and digital signature method for security. But, intrusion detection and avoidance is an inevitable challenge in networks. Authentication is performed in any PKI (Public Key Infrastructure system by checking if the certificate of the sender is included in the CRL (Certificate Revocation List and verifying the authenticity and checking the sign of the sender. This study focuses on efficient certificate revocation list management by region based certificate revocation list distribution protocol. Instead of storing all invalid vehicle identity in a single CRL, each region maintains a separate CRL which contains the invalid vehicle's identity in the region. This CRL checking process has been done using by Hash function technique, i.e., Bloom Filter which avoids false negative. It replaces the time-consuming CRL Checking process. This protocol can reduce message loss ratio by using fast revocation checking and the CRL updating method as well as it needs very less memory space compared to other methods.

  5. Disinvestment policy and the public funding of assisted reproductive technologies: outcomes of deliberative engagements with three key stakeholder groups.

    Science.gov (United States)

    Hodgetts, Katherine; Hiller, Janet E; Street, Jackie M; Carter, Drew; Braunack-Mayer, Annette J; Watt, Amber M; Moss, John R; Elshaug, Adam G

    2014-05-05

    Measures to improve the quality and sustainability of healthcare practice and provision have become a policy concern. In addition, the involvement of stakeholders in health policy decision-making has been advocated, as complex questions arise around the structure of funding arrangements in a context of limited resources. Using a case study of assisted reproductive technologies (ART), deliberative engagements with a range of stakeholder groups were held on the topic of how best to structure the distribution of Australian public funding in this domain. Deliberative engagements were carried out with groups of ART consumers, clinicians and community members. The forums were informed by a systematic review of ART treatment safety and effectiveness (focusing, in particular, on maternal age and number of treatment cycles), as well as by international policy comparisons, and ethical and cost analyses. Forum discussions were transcribed and subject to thematic analysis. Each forum demonstrated stakeholders' capacity to understand concepts of choice under resource scarcity and disinvestment, and to countenance options for ART funding not always aligned with their interests. Deliberations in each engagement identified concerns around 'equity' and 'patient responsibility', culminating in a broad preference for (potential) ART subsidy restrictions to be based upon individual factors rather than maternal age or number of treatment cycles. Community participants were open to restrictions based upon measures of body mass index (BMI) and smoking status, while consumers and clinicians saw support to improve these factors as part of an ART treatment program, as distinct from a funding criterion. All groups advocated continued patient co-payments, with measures in place to provide treatment access to those unable to pay (namely, equity of access). Deliberations yielded qualitative, socially-negotiated evidence required to inform ethical, accountable policy decisions in the specific

  6. 一种基于多变量公钥的软件注册方案%A SOFTWARE REGISTRATION SCHEME BASED ON MULTIVARIATE PUBLIC KEY

    Institute of Scientific and Technical Information of China (English)

    黄宁

    2013-01-01

    对中间域多变量公钥密码算法MFE(Medium-Field Multivariate Public Key Encryption)可能遇到的奇异性进行分析和处理,并研究其应用于软件注册。用改进的MFE多变量公钥密码算法,在扩展ASCⅡ字符集构建的有限域F(28)中,设计软件注册方案,运算过程多处采用了不可更改的机器指纹信息,实现一次一密,为了提高安全性,在注册码的形成过程中对字符进行分解;而在注册码的验证过程中对字符进行合成,抗代数攻击能力得到提高。由于注册码对机器指纹信息的依赖,有效防止多机共享注册码。%We analyse and process the singularity which might be encountered by MFE(medium-field multivariate public key encryption)and study the application of it in software registration.We use the enhanced MFE multivariate public key encryption to design a software registration scheme in finite field F (28 )configured from the character set of extended ASCII,which uses unchangeable fingerprints of machine in several steps of operation,and realises one key used for just one time.In order to enhance the security,characters are decomposed in the process of registration string generation,and then are composed in the process of registration string verification,thus the ability to withstand the algebraic attacks is enhanced. The dependence of registration string on machine fingerprints effectively prevents any registration string from being shared by multiple machines.

  7. Improving the accuracy of death certification

    Science.gov (United States)

    Myers, K A; Farquhar, D R

    1998-01-01

    BACKGROUND: Population-based mortality statistics are derived from the information recorded on death certificates. This information is used for many important purposes, such as the development of public health programs and the allocation of health care resources. Although most physicians are confronted with the task of completing death certificates, many do not receive adequate training in this skill. Resulting inaccuracies in information undermine the quality of the data derived from death certificates. METHODS: An educational intervention was designed and implemented to improve internal medicine residents' accuracy in death certificate completion. A total of 229 death certificates (146 completed before and 83 completed after the intervention) were audited for major and minor errors, and the rates of errors before and after the intervention were compared. RESULTS: Major errors were identified on 32.9% of the death certificates completed before the intervention, a rate comparable to previously reported rates for internal medicine services in teaching hospitals. Following the intervention the major error rate decreased to 15.7% (p = 0.01). The reduction in the major error rate was accounted for by significant reductions in the rate of listing of mechanism of death without a legitimate underlying cause of death (15.8% v. 4.8%) (p = 0.01) and the rate of improper sequencing of death certificate information (15.8% v. 6.0%) (p = 0.03). INTERPRETATION: Errors are common in the completion of death certificates in the inpatient teaching hospital setting. The accuracy of death certification can be improved with the implementation of a simple educational intervention. PMID:9614825

  8. Public health workforce taxonomy.

    Science.gov (United States)

    Boulton, Matthew L; Beck, Angela J; Coronado, Fátima; Merrill, Jacqueline A; Friedman, Charles P; Stamas, George D; Tyus, Nadra; Sellers, Katie; Moore, Jean; Tilson, Hugh H; Leep, Carolyn J

    2014-11-01

    Thoroughly characterizing and continuously monitoring the public health workforce is necessary for ensuring capacity to deliver public health services. A prerequisite for this is to develop a standardized methodology for classifying public health workers, permitting valid comparisons across agencies and over time, which does not exist for the public health workforce. An expert working group, all of whom are authors on this paper, was convened during 2012-2014 to develop a public health workforce taxonomy. The purpose of the taxonomy is to facilitate the systematic characterization of all public health workers while delineating a set of minimum data elements to be used in workforce surveys. The taxonomy will improve the comparability across surveys, assist with estimating duplicate counting of workers, provide a framework for describing the size and composition of the workforce, and address other challenges to workforce enumeration. The taxonomy consists of 12 axes, with each axis describing a key characteristic of public health workers. Within each axis are multiple categories, and sometimes subcategories, that further define that worker characteristic. The workforce taxonomy axes are occupation, workplace setting, employer, education, licensure, certification, job tasks, program area, public health specialization area, funding source, condition of employment, and demographics. The taxonomy is not intended to serve as a replacement for occupational classifications but rather is a tool for systematically categorizing worker characteristics. The taxonomy will continue to evolve as organizations implement it and recommend ways to improve this tool for more accurate workforce data collection.

  9. Institutional review boards' use and understanding of certificates of confidentiality.

    Science.gov (United States)

    Beskow, Laura M; Check, Devon K; Namey, Emily E; Dame, Lauren A; Lin, Li; Cooper, Alexandra; Weinfurt, Kevin P; Wolf, Leslie E

    2012-01-01

    Certificates of Confidentiality, issued by agencies of the U.S. government, are regarded as an important tool for meeting ethical and legal obligations to safeguard research participants' privacy and confidentiality. By shielding against forced disclosure of identifying data, Certificates are intended to facilitate research on sensitive topics critical to the public's health. Although Certificates are potentially applicable to an extensive array of research, their full legal effect is unclear, and little is known about stakeholders' views of the protections they provide. To begin addressing this challenge, we conducted a national survey of institutional review board (IRB) chairs, followed by telephone interviews with selected chairs, to learn more about their familiarity with and opinions about Certificates; their institutions' use of Certificates; policies and practices concerning when Certificates are required or recommended; and the role Certificates play in assessments of research risk. Overall, our results suggest uncertainty about Certificates among IRB chairs. On most objective knowledge questions, most respondents chose the incorrect answer or 'unsure'. Among chairs who reported more familiarity with Certificates, composite opinion scores calculated based on five survey questions were evenly distributed among positive, neutral/middle, and negative views. Further, respondents expressed a variety of ideas about the appropriate use of Certificates, what they are intended to protect, and their effect on research risk. Nevertheless, chairs who participated in our study commonly viewed Certificates as a potentially valuable tool, frequently describing them as an 'extra layer' of protection. These findings lead to several practical observations concerning the need for more stakeholder education about Certificates, consideration of Certificates for a broader range of studies, the importance of remaining vigilant and using all tools available to protect participants

  10. Institutional review boards' use and understanding of certificates of confidentiality.

    Directory of Open Access Journals (Sweden)

    Laura M Beskow

    Full Text Available Certificates of Confidentiality, issued by agencies of the U.S. government, are regarded as an important tool for meeting ethical and legal obligations to safeguard research participants' privacy and confidentiality. By shielding against forced disclosure of identifying data, Certificates are intended to facilitate research on sensitive topics critical to the public's health. Although Certificates are potentially applicable to an extensive array of research, their full legal effect is unclear, and little is known about stakeholders' views of the protections they provide. To begin addressing this challenge, we conducted a national survey of institutional review board (IRB chairs, followed by telephone interviews with selected chairs, to learn more about their familiarity with and opinions about Certificates; their institutions' use of Certificates; policies and practices concerning when Certificates are required or recommended; and the role Certificates play in assessments of research risk. Overall, our results suggest uncertainty about Certificates among IRB chairs. On most objective knowledge questions, most respondents chose the incorrect answer or 'unsure'. Among chairs who reported more familiarity with Certificates, composite opinion scores calculated based on five survey questions were evenly distributed among positive, neutral/middle, and negative views. Further, respondents expressed a variety of ideas about the appropriate use of Certificates, what they are intended to protect, and their effect on research risk. Nevertheless, chairs who participated in our study commonly viewed Certificates as a potentially valuable tool, frequently describing them as an 'extra layer' of protection. These findings lead to several practical observations concerning the need for more stakeholder education about Certificates, consideration of Certificates for a broader range of studies, the importance of remaining vigilant and using all tools available to

  11. 45 CFR 1301.13 - Accounting system certification.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Accounting system certification. 1301.13 Section... START PROGRAM HEAD START GRANTS ADMINISTRATION General Requirements § 1301.13 Accounting system... shall submit an accounting system certification, prepared by an independent auditor, stating that...

  12. 22 CFR 181.6 - Documentation and certification.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Documentation and certification. 181.6 Section 181.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL AGREEMENTS COORDINATION, REPORTING AND PUBLICATION OF INTERNATIONAL AGREEMENTS § 181.6 Documentation and certification. (a) Transmittals of concluded...

  13. 45 CFR Appendix A to Part 604 - Certification Regarding Lobbying

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Certification Regarding Lobbying A Appendix A to... NEW RESTRICTIONS ON LOBBYING Pt. 604, App. A Appendix A to Part 604—Certification Regarding Lobbying... and submit Standard Form-LLL, “Disclosure Form to Report Lobbying,” in accordance with...

  14. 43 CFR 1.5 - Signature to constitute certificate.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Signature to constitute certificate. 1.5... OF THE INTERIOR § 1.5 Signature to constitute certificate. When an individual who appears in a representative capacity signs a paper in practice before the Department, his signature shall constitute...

  15. A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

    Directory of Open Access Journals (Sweden)

    Alexander Klimm

    2011-01-01

    Full Text Available Public Key Cryptography enables entity authentication protocols based on a platform's knowledge of other platforms' public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be stored inside the mobile platform. At some point during the platform's lifetime, these might need to be updated in the field due to loss or damage of tokens. This paper proposes a holistic approach for an automotive access control system based on Public Key Cryptography. Next to a FPGA-based hardware architecture, we focus on a secure scheme for key flashing of public keys to highly mobile systems. The main goal of the proposed scheme is the minimization of online dependencies to Trusted Third Parties, Certification Authorities, or the like, to enable key flashing in remote locations with only minor technical infrastructure. Introducing trusted mediator devices, new tokens can be authorized and later their public key can be flashed into a mobile system on demand.

  16. 基于广域特征关联的公钥高深度加密方案%Method of Public-Key Deep Encryption Based on Public Characteristic Correlation

    Institute of Scientific and Technical Information of China (English)

    赵晓津

    2014-01-01

    研究基于广域特征关联的标准模型下伪装网络入侵容忍公钥高深度加密方案,提出一种基于特征关联的公钥加密方案,通过对入侵网络数据进行特征分析的方法,提取入侵数据的原始特征,在此基础上,通过特征关联的方法对公钥进行加密,大大提高了破解难度;采用一段随机的文本进行性能测试,结果显示,与传统加密方案相比较,所提加密方案具有更高的加密深度和解密正确率,且加密后文本容量较小,基本不影响系统处理和传输,具有很好的应用价值。%Study on the method of public-key deep encryption in standard intrusion tolerant model. A method of public-key encryption in standard intrusion tolerant model was proposed, the input data was analyzed with characteristic extrac-tion, and then, the public-key encryption was done with characteristic correlation, and with which, it was more difficult to break. A random text in this paper was taken as target to test the ability of encrypting and breaking, the result shows that compared with traditional method, the new method has a higher ability for encryption and a higher rate of break, the text size after encryption is similar with original, so it does not affect the process and transmission, it will be applied widely.

  17. 42 CFR 403.232 - Requirements and procedures for obtaining certification.

    Science.gov (United States)

    2010-10-01

    ... certification. 403.232 Section 403.232 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... Voluntary Certification Program: General Provisions § 403.232 Requirements and procedures for obtaining certification. (a) To be certified by CMS, a policy must meet— (1) The NAIC model standards specified in §...

  18. 41 CFR 102-37.215 - When must a SASP make a certification regarding lobbying?

    Science.gov (United States)

    2010-07-01

    ... certification regarding lobbying? 102-37.215 Section 102-37.215 Public Contracts and Property Management Federal... Property § 102-37.215 When must a SASP make a certification regarding lobbying? You are subject to the anti-lobbying certification and disclosure requirements in part 105-69 of this title when all of the...

  19. Section 608 Technician Certification

    Science.gov (United States)

    Certifications for technicians who maintain, service, repair, or dispose of equipment that could release ozone depleting refrigerants or, after January 1, 2018, substitute refrigerants into the atmosphere.

  20. Medical Certification System -

    Data.gov (United States)

    Department of Transportation — Provides automated risk-based decision making capability in support of medical certification and clearances processing associated fees and supporting surveillance of...

  1. Implications for alcohol minimum unit pricing advocacy: what can we learn for public health from UK newsprint coverage of key claim-makers in the policy debate?

    Science.gov (United States)

    Hilton, Shona; Wood, Karen; Patterson, Chris; Katikireddi, Srinivasa Vittal

    2014-02-01

    On May 24th 2012, Scotland passed the Alcohol (Minimum Pricing) Bill. Minimum unit pricing (MUP) is an intervention that raises the price of the cheapest alcohol to reduce alcohol consumption and related harms. There is a growing literature on industry's influence in policymaking and media representations of policies, but relatively little about frames used by key claim-makers in the public MUP policy debate. This study elucidates the dynamic interplay between key claim-makers to identify lessons for policy advocacy in the media in the UK and internationally. Content analysis was conducted on 262 articles from seven UK and three Scottish national newspapers between 1st May 2011 and 31st May 2012, retrieved from electronic databases. Advocates' and critics' constructions of the alcohol problem and MUP were examined. Advocates depicted the problem as primarily driven by cheap alcohol and marketing, while critics' constructions focused on youth binge drinkers and dependent drinkers. Advocates justified support by citing the intervention's targeted design, but critics denounced the policy as illegal, likely to encourage illicit trade, unsupported by evidence and likely to be ineffective, while harming the responsible majority, low-income consumers and businesses. Critics' arguments were consistent over time, and single statements often encompassed multiple rationales. This study presents advocates with several important lessons for promoting policies in the media. Firstly, it may be useful to shift focus away from young binge drinkers and heavy drinkers, towards population-level over-consumption. Secondly, advocates might focus on presenting the policy as part of a wider package of alcohol policies. Thirdly, emphasis on the success of recent public health policies could help portray the UK and Scotland as world leaders in tackling culturally embedded health and social problems through policy; highlighting past successes when presenting future policies may be a valuable

  2. RSES heat pump technician certification

    Energy Technology Data Exchange (ETDEWEB)

    Zeiner, J.

    1996-06-01

    In 1987 the National Heat Pump certification test was developed by the Refrigeration Service Engineers Society (RSES), and in 1994, the program was more specifically named Heat Pump Service Technician Certification. This report describes the benefits of certification.

  3. Integrating a Trust Framework with a Distributed Certificate Validation Scheme for MANETs

    Directory of Open Access Journals (Sweden)

    Marias Giannis F

    2006-01-01

    Full Text Available Many trust establishment solutions in mobile ad hoc networks (MANETs rely on public key certificates. Therefore, they should be accompanied by an efficient mechanism for certificate revocation and validation. Ad hoc distributed OCSP for trust (ADOPT is a lightweight, distributed, on-demand scheme based on cached OCSP responses, which provides certificate status information to the nodes of a MANET. In this paper we discuss the ADOPT scheme and issues on its deployment over MANETs. We present some possible threats to ADOPT and suggest the use of a trust assessment and establishment framework, named ad hoc trust framework (ATF, to support ADOPT's robustness and efficiency. ADOPT is deployed as a trust-aware application that provides feedback to ATF, which calculates the trustworthiness of the peer nodes' functions and helps ADOPT to improve its performance by rapidly locating valid certificate status information. Moreover, we introduce the TrustSpan algorithm to reduce the overhead that ATF produces, and the TrustPath algorithm to identify and use trusted routes for propagating sensitive information, such as third parties' accusations. Simulation results show that ATF adds limited overhead compared to its efficiency in detecting and isolating malicious and selfish nodes. ADOPT's reliability is increased, since it can rapidly locate a legitimate response by using information provided by ATF.

  4. Audio Information Hiding Algorithm Based on Knapsack Public-key%一种基于背包公钥的语音信息隐藏算法

    Institute of Scientific and Technical Information of China (English)

    付喜辉; 丁文龙

    2011-01-01

    针对在传榆语音秘密信息过程中存在破坏或窃取的问题,提出一种鲁棒性较强的信息隐藏方法.把一段语言作为秘密信息隐藏到宿主音频中,在公共信道中传递秘密信息.该算法是根据人类听觉系统在小波域中嵌入秘密信息,并且利用背包公钥可以使隐藏的信息具有加密功能.对于外界的噪声、压缩、滤波干扰有很强的抗干扰能力.%Secret audio message has to experience all kinds of attacks during transporting. This paper presents a steganography algorithm with strong robustness. It embeds a speech as the secret message into original audio signal, and transmits the secret message in the public channel. The algorithm makes use of Human Auditory System (HAS) characteristics and embeds secret message in the wavelet domain. With knapsack public-key, the algorithm not only encrypts the hiding information but also encrypting the information. It also has strong anti-disturbance ability against noise, compression and filter.

  5. Trust Based Certificate Revocation for Secure Routing

    DEFF Research Database (Denmark)

    xmw970, xmw970

    2016-01-01

    propose to develop a CA distribution and a Trust based threshold revocation method. Initially the trust value is computed from the direct and indirect trust values. And the certificate authorities distributes the secret key to al the nodes. Followed by this a trust based threshold revocation method...

  6. EAS Telecommunications Certification Bodies (TCB)

    Data.gov (United States)

    Federal Communications Commission — EAS (Equipment Authorization System). A Telecommunication Certification Body (TCB) is an accredited product certification body with the authority to issue Grants of...

  7. 36 CFR 21.8 - Employee certification.

    Science.gov (United States)

    2010-07-01

    ... Section 21.8 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE INTERIOR HOT SPRINGS NATIONAL PARK; BATHHOUSE REGULATIONS § 21.8 Employee certification. (a) Employees engaged as physical therapists must be licensed or certified by a State or territory of the United States to...

  8. Soy production and certification

    DEFF Research Database (Denmark)

    Tomei, Julia; Semino, Stella Maris; Paul, Helena

    2010-01-01

    With the rising emphasis on biofuels as a potential solution to climate change, this paper asks whether certification schemes, developed to promote sustainable feedstock production, are able to deliver genuine sustainability benefits. The Round Table on Responsible Soy (RTRS) is a certification s...

  9. Converse Barrier Certificate Theorems

    DEFF Research Database (Denmark)

    Wisniewski, Rafael; Sloth, Christoffer

    2016-01-01

    This paper shows that a barrier certificate exists for any safe dynamical system. Specifically, we prove converse barrier certificate theorems for a class of structurally stable dynamical systems. Other authors have developed a related result by assuming that the dynamical system has neither sing...

  10. Certification Programs for Citrus

    Science.gov (United States)

    Citrus certification programs designed to ensure that healthy plants of the highest genetic potential are being planted in the field are the basic building block of an integrated pest management program. Certification programs began for citrus began with the discovery that the diseases were graft t...

  11. 49 CFR 583.13 - Supplier certification and certificates.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Supplier certification and certificates. 583.13... § 583.13 Supplier certification and certificates. Each supplier shall certify the information on each... supplier in any mode (e.g., paper, electronic) provided the mode contains all information in...

  12. Certification Report: Army Aviation Alternative Fuels Certification Program

    Science.gov (United States)

    2016-08-01

    SPECIAL REPORT RDMR-AE-16-02 CERTIFICATION REPORT: ARMY AVIATION ALTERNATIVE FUELS CERTIFICATION PROGRAM Dale Cox...NOT TO BE CONSTRUED AS AN OFFICIAL DEPARTMENT OF THE ARMY POSITION UNLESS SO DESIGNATED BY OTHER AUTHORIZED DOCUMENTS. TRADE NAMES USE...COVERED Final 4. TITLE AND SUBTITLE Certification Report: Army Aviation Alternative Fuels Certification Program 5. FUNDING NUMBERS 6

  13. 45 CFR 2543.17 - Certifications and representations.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Certifications and representations. 2543.17 Section 2543.17 Public Welfare Regulations Relating to Public Welfare (Continued) CORPORATION FOR NATIONAL AND COMMUNITY SERVICE GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, AND...

  14. Converse Barrier Certificate Theorem

    DEFF Research Database (Denmark)

    Wisniewski, Rafael; Sloth, Christoffer

    2013-01-01

    This paper presents a converse barrier certificate theorem for a generic dynamical system.We show that a barrier certificate exists for any safe dynamical system defined on a compact manifold. Other authors have developed a related result, by assuming that the dynamical system has no singular...... points in the considered subset of the state space. In this paper, we redefine the standard notion of safety to comply with generic dynamical systems with multiple singularities. Afterwards, we prove the converse barrier certificate theorem and illustrate the differences between ours and previous work...

  15. Employment certificates on HRT

    CERN Multimedia

    HR Department

    2008-01-01

    As part of the ongoing drive to simplify and streamline administrative procedures and processes, the IT and HR Departments have made employment certificates available on a self-service basis on the HRT application, in the main menu under "My self services". All members of the personnel can thus obtain a certificate of employment or association, in French or in English, for the present or past contractual period. The HR Department’s Records Office remains responsible for issuing any special certificates that might be required. IT-AIS (Administrative Information Services) HR-SPS (Services, Procedures & Social) Records Office – Tel. 73700

  16. CFPC's Certification Examination

    Science.gov (United States)

    Handfield-Jones, Richard; Hollingworth, Gary R.

    1990-01-01

    The certification examination of the College of Family Physicians of Canada is designed to assess the extent to which the College's educational objectives have been achieved. Since the first examination in 1969, more than 7000 physicians have received their certification. The authors describe the basic elements of this test and the process through which the Committee on Examinations designs and sets the examination. The authors comment on the role of the certification process in the education of family physicians in Canada. Imagesp2073-a PMID:21233952

  17. Indirect Air Carrier Certification

    Data.gov (United States)

    Department of Homeland Security — Required information is entered in order to obtain an IAC certification and do business as an IAC. Information is verified through site inspections and inspections...

  18. Renewable Energy Certificates (RECs)

    Science.gov (United States)

    Renewable Energy Certificates (RECs), are tradable, non-tangible energy commodities in the United States that represent proof that 1 megawatt-hour (MWh) of electricity was generated from an eligible renewable energy resource.

  19. Certification renewal process of the American Board of Orthodontics.

    Science.gov (United States)

    Castelein, Paul T; DeLeon, Eladio; Dugoni, Steven A; Chung, Chun-Hsi; Tadlock, Larry P; Barone, Nicholas D; Kulbersh, Valmy P; Sabott, David G; Kastrop, Marvin C

    2015-05-01

    The American Board of Orthodontics was established in 1929 and is the oldest specialty board in dentistry. Its goal is to protect the public by ensuring competency through the certification of eligible orthodontists. Originally, applicants for certification submitted a thesis, 5 case reports, and a set of casts with appliances. Once granted, the certification never expired. Requirements have changed over the years. In 1950, 15 cases were required, and then 10 in 1987. The Board has continued to refine and improve the certification process. In 1998, certification became time limited, and a renewal process was initiated. The Board continues to improve the recertification process. Copyright © 2015 American Association of Orthodontists. Published by Elsevier Inc. All rights reserved.

  20. Evaluation of unique identifiers used as keys to match identical publications in Pure and SciVal – a case study from health science [version 2; referees: 1 approved, 2 approved with reservations

    Directory of Open Access Journals (Sweden)

    Heidi Holst Madsen

    2016-09-01

    Full Text Available Unique identifiers (UID are seen as an effective key to match identical publications across databases or identify duplicates in a database. The objective of the present study is to investigate how well UIDs work as match keys in the integration between Pure and SciVal, based on a case with publications from the health sciences. We evaluate the matching process based on information about coverage, precision, and characteristics of publications matched versus not matched with UIDs as the match keys. We analyze this information to detect errors, if any, in the matching process. As an example we also briefly discuss how publication sets formed by using UIDs as the match keys may affect the bibliometric indicators number of publications, number of citations, and the average number of citations per publication.  The objective is addressed in a literature review and a case study. The literature review shows that only a few studies evaluate how well UIDs work as a match key. From the literature we identify four error types: Duplicate digital object identifiers (DOI, incorrect DOIs in reference lists and databases, DOIs not registered by the database where a bibliometric analysis is performed, and erroneous optical or special character recognition. The case study explores the use of UIDs in the integration between the databases Pure and SciVal. Specifically journal publications in English are matched between the two databases. We find all error types except erroneous optical or special character recognition in our publication sets. In particular the duplicate DOIs constitute a problem for the calculation of bibliometric indicators as both keeping the duplicates to improve the reliability of citation counts and deleting them to improve the reliability of publication counts will distort the calculation of average number of citations per publication. The use of UIDs as a match key in citation linking is implemented in many settings, and the availability of

  1. Ready-to-eat cereals are key sources of selected micronutrients among schoolchildren from public and private elementary schools in Quetzaltenango, Guatemala.

    Science.gov (United States)

    Montenegro-Bethancourt, Gabriela; Vossenaar, Marieke; Kuijper, Lothar D; Doak, Colleen M; Solomons, Noel W

    2009-05-01

    This cross-sectional dietary survey aimed to assess the consumption and relative nutrient contribution of ready-to-eat cereals (RTEC) among schoolchildren from 2 social classes in an urban center in the Guatemalan province of Quetzaltenango. A total of 449 24-hour dietary records were collected using a pictorial workbook registry method among third- and fourth-grade schoolchildren. The sample population was divided between low-income, public school attendants (n = 219) and students from higher-income private institutions (n = 230). We described the contribution of RTEC to estimated total energy; carbohydrates; protein; fat; vitamins A, C, and D; thiamin; riboflavin; folate; calcium; iron; and zinc over the 24-hour interval of registry. Approximately 41% of the subjects mentioned RTEC at least once in their 24-hour record; 93% of these at breakfast time. From the 7 RTEC varieties reported, 4 were presweetened. Estimated cereal consumption was significantly higher among private school participants (P < .001). The RTEC contributed 2.4% of estimated total energy across the whole sample and 3.6% of total carbohydrate; iron intake from RTEC was 21% of total, whereas less than 1% of calcium intake came from this source. Among the subgroup of cereal consumers, RTEC accounted for more than 40% of their daily recommendation intake for iron, vitamin C, thiamin, and riboflavin. The RTEC consumers had significantly higher intakes for all nutrients except carbohydrate and riboflavin as compared with nonconsumers. This study demonstrates the importance of RTEC as a key source of several selected micronutrients to schoolchildren's diet in this setting.

  2. Intelligent policy making? Key actors' perspectives on the development and implementation of an early years' initiative in Scotland's public health arena.

    Science.gov (United States)

    Deas, L; Mattu, L; Gnich, W

    2013-11-01

    Increased political enthusiasm for evidence-based policy and action has re-ignited interest in the use of evidence within political and practitioner networks. Theories of evidence-based policy making and practice are being re-considered in an attempt to better understand the processes through which knowledge translation occurs. Understanding how policy develops, and practice results, has the potential to facilitate effective evidence use. Further knowledge of the factors which shape healthcare delivery and their influence in different contexts is needed. This paper explores the processes involved in the development of a complex intervention in Scotland's National Health Service (NHS). It uses a national oral health programme for children (Childsmile) as a case study, drawing upon key actors' perceptions of the influence of different drivers (research evidence, practitioner knowledge and values, policy, and political and local context) to programme development. Framework analysis is used to analyse stakeholder accounts from in-depth interviews. Documentary review is also undertaken. Findings suggest that Childsmile can be described as an 'evidence-informed' intervention, blending available research evidence with knowledge from practitioner experience and continual learning through evaluation, to plan delivery. The importance of context was underscored, in terms of the need to align with prevailing political ideology and in the facilitative strength of networks within the relatively small public health community in Scotland. Respondents' perceptions support several existing theoretical models of translation, however no single theory offered a comprehensive framework covering all aspects of the complex processes reported. Childsmile's use of best available evidence and on-going contribution to knowledge suggest that the programme is an example of intelligent policy making with international relevance.

  3. ARAC: Alternative Route to Administrative Certification. A New Model for Administrator Certification.

    Science.gov (United States)

    Hecht, Jeffrey B.; Ashby, Dianne; Azinger, Al; Klass, Patricia H.

    Alternative routes to administrator certification may provide many benefits to states and school districts unable to fill critical public school administrative positions. Such programs can appeal to qualified individuals outside of education, as well as those persons unable or unwilling to progress through a traditional program of study. To be…

  4. ENVIRONMENTAL MANAGEMENT SYSTEMS CERTIFICATION

    Directory of Open Access Journals (Sweden)

    Aniko Miler-Virc

    2012-12-01

    Full Text Available ISO 14001 prescribes the requirements for a system, not environmental performance itself. Similarly, certification is of the management system itself, not environmental performance. An audit is not conducted to ascertain whether your flue gas emissions are less than X part per million nitrous oxide or that your wastewater effluent contains less that Y milligrams of bacteria per litre. Consequently, the procces of auditing the system for compliance to the standard entails checking to see that all of the necessary components of a functioning system are present and working properly.           A company can have a complete and fully functional EMS as prescribed by ISO 14001 without being certified. As certification can add to the time and expense of EMS development, it is important for you to establish, in advance, whether certification is of net benefit to you. Although most companies that develop an EMS do in fact certify, there are cases where certification does not add immediate value. Certification is not always beneficial to small and medium sized companies. Certification is not always necessary for companies with one or two large clients with environmental demands who are satisfied that you have a functional EMS (second-party declaration. Whatever decision you make, it is important to remember that just as a driver′s licence does not automatically make you a good driver, ISO 14001 certification does not automatically make your company environmentally benign or ensure that you will continually improve environmental performance. The system is only as good as the people who operate it.

  5. ZooKeys, unlocking Earth’s incredible biodiversity and building a sustainable bridge into the public domain: From “print-based” to “web-based” taxonomy, systematics, and natural history. ZooKeys Editorial Opening Paper

    Directory of Open Access Journals (Sweden)

    Lyubomir Penev

    2008-07-01

    Full Text Available Publishing taxonomic and systematics studies in the digital era faces major challenges and requires new approaches, many of which are currently stimulating spirited discussions amongst taxonomists and systematists. New amendments to the International Code of Zoological Nomenclature are expected to regulate electronic publishing of new taxa and create a standard form for their registration (ZooBank. Responding to a perceived need, this editorial announces establishment of ZooKeys – a new online and print journal in zoological taxonomy and systematics, which aims to quickly respond and adapt to the newest developments in taxonomic publishing. Open Access is accepted as mandatory for ZooKeys. Th e rationale for and concept of ZooKeys is discussed in detail.

  6. Biofuels and certification. A workshop at the Harvard Kennedy School of Government. Summary report

    Energy Technology Data Exchange (ETDEWEB)

    Devereaux, Charan; Lee, Henry

    2009-06-01

    both forests and food supplies from increased biofuel production is real, it is not clear that setting broad sustainability standards and then requiring sellers to certify that all of those standards have been met is the best way to address these interconnected problems. In particular, if too many standards and related certification requirements are put in place too soon, this could constrain the development of a global biofuels market. In contrast, certification targeted at a specific and limited set of problems and designed with the flexibility to adjust to changes in policies and programs can enhance the public's acceptance of the biofuel option while protecting key social and environmental goals. A second set of questions revolves around the locus of responsibility for certifying whether biofuel production meets sustainability targets. Should the biofuel processing firms, third parties, or governments be responsible for certifying the production of biofuels? This question also elicited significant discussion. While it could be easier to have individual country governments assume the certification of production responsibility, some governments may not have the capacity to implement an effective certification process. Production facilities that comply with international standards should not be kept out of the market because of their government's inability to manage the process. The possible contribution to effective certification of third party organizations or public-private partnerships should not be underestimated.

  7. Causes of death in Tonga: quality of certification and implications for statistics.

    Science.gov (United States)

    Carter, Karen; Hufanga, Sione; Rao, Chalapati; Akauola, Sione; Lopez, Alan D; Rampatige, Rasika; Taylor, Richard

    2012-03-05

    Detailed cause of death data by age group and sex are critical to identify key public health issues and target interventions appropriately. In this study the quality of local routinely collected cause of death data from medical certification is reviewed, and a cause of death profile for Tonga based on amended data is presented. Medical certificates of death for all deaths in Tonga for 2001 to 2008 and medical records for all deaths in the main island Tongatapu for 2008 were sought from the national hospital. Cause of death data for 2008 were reviewed for quality through (a) a review of current tabulation procedures and (b) a medical record review. Data from each medical record were extracted and provided to an independent medical doctor to assign cause of death, with underlying cause from the medical record tabulated against underlying cause from the medical certificate. Significant associations in reporting patterns were evaluated and final cause of death for each case in 2008 was assigned based on the best quality information from the medical certificate or medical record. Cause of death data from 2001 to 2007 were revised based on findings from the evaluation of certification of the 2008 data and added to the dataset. Proportional mortality was calculated and applied to age- and sex-specific mortality for all causes from 2001 to 2008. Cause of death was tabulated by age group and sex, and age-standardized (all ages) mortality rates for each sex by cause were calculated. Reported tabulations of cause of death in Tonga are of immediate cause, with ischemic heart disease and diabetes underrepresented. In the majority of cases the reported (immediate) cause fell within the same broad category as the underlying cause of death from the medical certificate. Underlying cause of death from the medical certificate, attributed to neoplasms, diabetes, and cardiovascular disease were assigned to other underlying causes by the medical record review in 70% to 77% of deaths. Of

  8. Causes of death in Tonga: quality of certification and implications for statistics

    Directory of Open Access Journals (Sweden)

    Carter Karen

    2012-03-01

    Full Text Available Abstract Background Detailed cause of death data by age group and sex are critical to identify key public health issues and target interventions appropriately. In this study the quality of local routinely collected cause of death data from medical certification is reviewed, and a cause of death profile for Tonga based on amended data is presented. Methods Medical certificates of death for all deaths in Tonga for 2001 to 2008 and medical records for all deaths in the main island Tongatapu for 2008 were sought from the national hospital. Cause of death data for 2008 were reviewed for quality through (a a review of current tabulation procedures and (b a medical record review. Data from each medical record were extracted and provided to an independent medical doctor to assign cause of death, with underlying cause from the medical record tabulated against underlying cause from the medical certificate. Significant associations in reporting patterns were evaluated and final cause of death for each case in 2008 was assigned based on the best quality information from the medical certificate or medical record. Cause of death data from 2001 to 2007 were revised based on findings from the evaluation of certification of the 2008 data and added to the dataset. Proportional mortality was calculated and applied to age- and sex-specific mortality for all causes from 2001 to 2008. Cause of death was tabulated by age group and sex, and age-standardized (all ages mortality rates for each sex by cause were calculated. Results Reported tabulations of cause of death in Tonga are of immediate cause, with ischemic heart disease and diabetes underrepresented. In the majority of cases the reported (immediate cause fell within the same broad category as the underlying cause of death from the medical certificate. Underlying cause of death from the medical certificate, attributed to neoplasms, diabetes, and cardiovascular disease were assigned to other underlying causes by

  9. Certificate Revocation Using Fine Grained Certificate Space Partitioning

    Science.gov (United States)

    Goyal, Vipul

    A new certificate revocation system is presented. The basic idea is to divide the certificate space into several partitions, the number of partitions being dependent on the PKI environment. Each partition contains the status of a set of certificates. A partition may either expire or be renewed at the end of a time slot. This is done efficiently using hash chains.

  10. Rehabilitation Counselor Certification: Moving Forward

    Science.gov (United States)

    Saunders, Jodi L.; Barros-Bailey, Mary; Chapman, Cindy; Nunez, Patricia

    2009-01-01

    This article provides a brief history of the Commission on Rehabilitation Counselor Certification and presents recent changes and strategic goals for moving forward. Challenges and opportunities for the profession in relation to certification are also discussed. (Contains 3 tables.)

  11. National Board Certification and Teachers' Career Paths: Does NBPTS Certification Influence How Long Teachers Remain in the Profession and Where They Teach?

    Science.gov (United States)

    Goldhaber, Dan; Hansen, Michael

    2009-01-01

    Investment in the certification of teachers by the National Board of Professional Teaching Standards (NBPTS) represents a significant policy initiative for the nation's public school teachers. This article investigates the potential impact of NBPTS certification on teachers' career paths. Using a competing risks model on data from North Carolina…

  12. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  13. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  14. 77 FR 6482 - Conductor Certification

    Science.gov (United States)

    2012-02-08

    ... TRANSPORTATION Federal Railroad Administration 49 CFR Part 242 Conductor Certification AGENCY: Federal Railroad..., published on November 9, 2011, which prescribed regulations for certification of conductors as required by... Certification, U.S. Department of Transportation, Federal Railroad Administration, Mail Stop-25, Room...

  15. Certificateless Public Auditing Protocol with Constant Verification Time

    Directory of Open Access Journals (Sweden)

    Dongmin Kim

    2017-01-01

    Full Text Available To provide the integrity of outsourced data in the cloud storage services, many public auditing schemes which allow a user to check the integrity of the outsourced data have been proposed. Since most of the schemes are constructed on Public Key Infrastructure (PKI, they suffer from several concerns like management of certificates. To resolve the problems, certificateless public auditing schemes also have been studied in recent years. In this paper, we propose a certificateless public auditing scheme which has the constant-time verification algorithm. Therefore, our scheme is more efficient than previous certificateless public auditing schemes. To prove the security of our certificateless public auditing scheme, we first define three formal security models and prove the security of our scheme under the three security models.

  16. Certificate Completion And Compliance (CCC For Building Certification In Malaysia: Literature Review

    Directory of Open Access Journals (Sweden)

    Zakaria R.

    2014-01-01

    Full Text Available Certification of buildings is one of the conditions set by the government to ensure that buildings are constructed to achieve the required standards. This intended to safeguard the interests of the parties involved, especially the buyers. To improve public service delivery while not ignoring the interests of those involved, government held a new system for new building to obtain theirbuilding certification. The new system used called Certificate Completion and Compliance (CCC where the appointed professionals were commonly known as Prinsiple Submitting Person (PSP, which will issue the certificate of the building. This study is to look at the existing literature related to building certification using PSP services under this CCC method. Literature from both local and overseas were revied in this paper. The authors intend to collect data from respondentsthat is the architects of 337 people and covers 12 local authorities in Selangor (first developed state in Malaysia. All types of buildings involved in this study. This study uses quantitative methods and qualitative questionnaires through interviews with respondents. All data were analysed by descriptive and inferential statisticsapproach.

  17. Completeness of HIV reporting on death certificates for Floridians reported with HIV infection, 2000-2011

    OpenAIRE

    Trepka, Mary Jo; Diana M. Sheehan; Fennie, Kristopher P.; Niyonsenga, Theophile; Lieb, Spencer; Maddox, Lorene

    2015-01-01

    HIV mortality is used as a key measure to monitor the impact of HIV throughout the world. It is important that HIV be correctly recorded on death certificates so that the burden of HIV mortality can be tracked accurately. The objective of this study was to determine the extent of failure to correctly report HIV on death certificates and examine patterns of incompleteness by demographic factors. Causes of death on death certificates of people infected with HIV reported to the Florida HIV surve...

  18. BECSI: Bandwidth Efficient Certificate Status Information Distribution Mechanism for VANETs

    Directory of Open Access Journals (Sweden)

    Carlos Gañán

    2013-01-01

    Full Text Available Certificate revocation is a challenging task, especiallyin mobile network environments such as vehicular ad Hoc networks (VANETs.According to the IEEE 1609.2 security standard for VANETs, public keyinfrastructure (PKI will provide this functionality by means of certificate revocation lists (CRLs.When a certificate authority (CAneeds to revoke a certificate, itglobally distributes CRLs.Transmitting these lists pose a problem as they require high update frequencies and a lot of bandwidth. In this article, we propose BECSI, aBandwidth Efficient Certificate Status Informationmechanism to efficiently distributecertificate status information (CSI in VANETs.By means of Merkle hash trees (MHT, BECSI allowsto retrieve authenticated CSI not onlyfrom the infrastructure but also from vehicles actingas mobile repositories.Since these MHTs are significantly smaller than the CRLs, BECSIreduces the load on the CSI repositories and improves the response time for the vehicles.Additionally, BECSI improves the freshness of the CSIby combining the use of delta-CRLs with MHTs.Thus, vehicles that have cached the most current CRLcan download delta-CRLs to have a complete list of revoked certificates.Once a vehicle has the whole list of revoked certificates, it can act as mobile repository.

  19. What is organic certification?

    Science.gov (United States)

    Certified organic crop production is a holistic approach to sustainable and healthy food production to enhance the well being of the consumer, while protecting natural resources. Organic certification was implemented by the National Organic Program (NOP) in 2002 in recognition of the necessity for c...

  20. Towards FAA Certification of UAVs

    Science.gov (United States)

    Nelson, Stacy

    2003-01-01

    As of June 30, 2003, all Unmanned Aerial Vehicles (UAV), no matter how small, must adhere to the same FAA regulations as human-piloted aircraft. These regulations include certification for flying in controlled airspace and certification of flight software based on RTCA DO-178B. This paper provides an overview of the steps necessary to obtain certification, as well as a discussion about the challenges UAV's face when trying to meet these requirements. It is divided into two parts: 1) Certifications for Flying in Controlled Airspace; 2) Certification of Flight Software per RTCA DO-178B.

  1. Certificate Revocation System's Based on RB_Tree%基于RB_Tree的证书吊销系统

    Institute of Scientific and Technical Information of China (English)

    周海岩

    2009-01-01

    提出了公钥基础设施(Public Key Infrastructure,PKI)中证书吊销问题的一种解决方案--RB_搜索树解决方案(Certificate Revocation RB_Tree,CRRBT).该方案在查询与更新时最大时间复杂度始终保持在O(log2n)量级,对工程实现具有一定的指导意义.

  2. The Development of Key Performance Indicators to Monitor Early Facilities Management Performance Through the Use of BIM Technologies in Public Sector Projects

    OpenAIRE

    McAuley, Barry; Hore, Alan; West, Roger

    2015-01-01

    One of the biggest threats faced by governments in delivering greater efficiency on public works is the need for the public sector to have an enhanced physical environment to operate from. The physical environment can either enhance or impede worker productivity, therefore contributing to its bottom line profits and success of the organisation. This has now resulted in the AEC sector witnessing the development and adoption of Building Information Modelling (BIM), so as to ensure a new level o...

  3. Certification and beyond DINI open access activities in Germany

    CERN Document Server

    CERN. Geneva; Scholze, Frank

    2005-01-01

    Local publication servers are common and at the same time highly fragmented in Germany. To bring them to greater success it is necessary to standardize further developments. DINI with its publication "Electronic Publishing in Higher Education" laid a foundation for a widespread introduction of general regulations and standards concerning electronic publishing and archiving of scientific documents in institutional repositories. The DINI-Certificate "Document and Publication Repositories" takes this a step further by clearly describing criteria, that will guarantee repositories to be set up and operated according to national standards and international developments. Repositories fulfilling these criteria may be awarded a certificate, testifying to their quality. The DINI certificate may also help their operators to market the institutional repository as a reliable service to support electronic publishing as well as self- archiving at their institution. In parallel to this quality of service activities DINI star...

  4. A Matter of Trust: Ten Key Insights from Recent Public Opinion Research on Attitudes about Education among Hispanic Parents, Students and Young Adults

    Science.gov (United States)

    Gasbarra, Paul; Johnson, Jean

    2008-01-01

    In many respects, Hispanic families share the aspirations and anxieties of many other families nationwide: They are keenly focused on the role completing high school and going to college will play in their children's future. Students and young adults see success in school and college as key to interesting work and a prosperous future, and most are…

  5. PUBLIC KEY ENCRYPTION WITH MULTI-KEYWORD SEARCH BASED ON IPE%基于内积加密的支持多关键字检索的公钥加密方案

    Institute of Scientific and Technical Information of China (English)

    刘蓬涛

    2013-01-01

    Public-key encryption with multi-keyword search (PEMKS) is the extension of the public-key encryption with keyword search (PEKS),it can support the receiver to search all subsets of keywords embedded in the ciphertext.In this paper,we construct a PEMKS scheme by using inner-product encryption (IPE) scheme aiming at the problems of multi-keyword search in public key encryption as well as ciphertext length,and give the security analysis on it.%支持多关键字检索的公钥加密(PEMKS)是支持关键字检索的公钥加密(PEKS)的扩展,能够支持接收者对嵌入密文中的所有关键字的子集进行检索.针对公钥加密中的多关键字检索以及密文长度问题,利用内积加密方案构造一个支持多关键字检索的公钥加密方案并给出安全性分析.

  6. 76 FR 72493 - ITS Joint Program Office Webinar on Alternative Organizational Structures for a Certificate...

    Science.gov (United States)

    2011-11-23

    ... Organizational Structures for a Certificate Management Entity; Notice of Public Meeting AGENCY: Research and...-level, alternative organizational structures for a certificate management entity (CME) to support a... early analysis of organizational models. This analysis will describe the functions that need to be...

  7. 42 CFR 456.481 - Admission certification and plan of care.

    Science.gov (United States)

    2010-10-01

    ... Individuals Under Age 21: Admission and Plan of Care Requirements § 456.481 Admission certification and plan of care. If a facility provides inpatient psychiatric services to a recipient under age 21— (a) The... 42 Public Health 4 2010-10-01 2010-10-01 false Admission certification and plan of care....

  8. 41 CFR Appendix A to Part 105 - 69-Certification Regarding Lobbying

    Science.gov (United States)

    2010-07-01

    ... Regarding Lobbying A Appendix A to Part 105 Public Contracts and Property Management Federal Property... Administration 69-NEW RESTRICTIONS ON LOBBYING Pt. 105-69, App. A Appendix A to Part 105-69—Certification Regarding Lobbying Certification for Contracts, Grants, Loans, and Cooperative Agreements The...

  9. National Board Certification and Teachers' Career Paths: Does NBPTS Certification Influence How Long Teachers Remain in the Profession and Where They Teach?

    OpenAIRE

    Dan Goldhaber; Michael Hansen

    2009-01-01

    Investment in the certification of teachers by the National Board of Professional Teaching Standards (NBPTS) represents a significant policy initiative for the nation's public school teachers. This article investigates the potential impact of NBPTS certification on teachers' career paths. Using a competing risks model on data from North Carolina public schools, we find evidence that those teachers who apply to NBPTS are more likely to be mobile than are nonapplicants, particularly after they ...

  10. Key Statistics on Public Elementary and Secondary Education Reported by State and by Regional, Locale, and Wealth Clusters, 1987-88. Survey Report.

    Science.gov (United States)

    Davis, Jo Ann

    Regional and subregional division characteristics of public elementary and secondary education in the United States are reported. Characteristics associated with urbanicity and wealth are also reported. Factors examined are those most commonly used to identify the resources, needs, organization, and special characteristics of education within each…

  11. Key points of ifre protection analysis of public places of entertainment%公共娱乐场所的消防防火要点分析

    Institute of Scientific and Technical Information of China (English)

    张伟

    2015-01-01

    Now the number of public places of entertainment is increasing.When people relax in public places,they will ignore the safety hazard.This article will start with the definition and characteristics of public entertainment,analyze and study the hidden fire hazards,and put forward the fire prevention and fire prevention and management measures,in order to provide reference and reference for the elimination of public entertainment places.%现在公共娱乐场所数量与日俱增。人们在公共娱乐场所放松时,会忽视安全隐患。本文将从公共娱乐场所界定及其火灾特点入手,分析和研究公共场所存在的火灾隐患,最后提出消防防火要点及管理措施,以期为消除公共娱乐场所安全隐患提供参考和借鉴。

  12. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  13. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  14. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  15. Certification/enforcement analysis

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-06-01

    Industry compliance with minimum energy efficiency standards will be assured through a two-part program approach of certification and enforcement activities. The technical support document (TSD) presents the analyses upon which the proposed rule for assuring that consumer product comply with applicable energy efficiency standards is based. Much of the TSD is based upon support provided DOE by Vitro Laboratories. The OAO Corporation provided additional support in the development of the sampling plan incorporated in the proposed rule. Vitro's recommended approach to appliance certification and enforcement, developed after consideration of various program options, benefits, and impacts, establishes the C/E program framework, general criteria, and procedures for assuring a specified level of energy efficiency performance of covered consumer products. The results of the OAO analysis are given in Volume II of the TSD.

  16. 42 CFR 493.1773 - Standard: Basic inspection requirements for all laboratories issued a CLIA certificate and CLIA...

    Science.gov (United States)

    2010-10-01

    ... AND CERTIFICATION LABORATORY REQUIREMENTS Inspection § 493.1773 Standard: Basic inspection... 42 Public Health 5 2010-10-01 2010-10-01 false Standard: Basic inspection requirements for all laboratories issued a CLIA certificate and CLIA-exempt laboratories. 493.1773 Section 493.1773 Public...

  17. 33 CFR 159.15 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Certification. 159.15 Section 159... MARINE SANITATION DEVICES Certification Procedures § 159.15 Certification. (a) The recognized facility... certified, the Coast Guard includes a certification number for the device. If certification is denied,...

  18. 30 CFR 850.15 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Certification. 850.15 Section 850.15 Mineral..., EXAMINATION, AND CERTIFICATION OF BLASTERS PERMANENT REGULATORY PROGRAM REQUIREMENTS-STANDARDS FOR CERTIFICATION OF BLASTERS § 850.15 Certification. (a) Issuance of certification. The regulatory authority...

  19. 9 CFR 151.4 - Pedigree certificate.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Pedigree certificate. 151.4 Section... Purebred Animals § 151.4 Pedigree certificate. A pedigree certificate for an animal of a breed listed in... English in the pedigree certificate for the animal or in a separate certificate appended to the pedigree...

  20. Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment

    Science.gov (United States)

    Hassan, Waleed K.; Al-Assam, Hisham

    2017-05-01

    The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.

  1. 42 CFR 493.43 - Application for registration certificate, certificate for provider-performed microscopy (PPM...

    Science.gov (United States)

    2010-10-01

    ..., certificate for provider-performed microscopy (PPM) procedures, and certificate of compliance. 493.43 Section... Provider-performed Microscopy Procedures, and Certificate of Compliance § 493.43 Application for registration certificate, certificate for provider-performed microscopy (PPM) procedures, and certificate...

  2. Certification trails for data structures

    Science.gov (United States)

    Sullivan, Gregory F.; Masson, Gerald M.

    1993-01-01

    Certification trails are a recently introduced and promising approach to fault detection and fault tolerance. The applicability of the certification trail technique is significantly generalized. Previously, certification trails had to be customized to each algorithm application; trails appropriate to wide classes of algorithms were developed. These certification trails are based on common data-structure operations such as those carried out using these sets of operations such as those carried out using balanced binary trees and heaps. Any algorithms using these sets of operations can therefore employ the certification trail method to achieve software fault tolerance. To exemplify the scope of the generalization of the certification trail technique provided, constructions of trails for abstract data types such as priority queues and union-find structures are given. These trails are applicable to any data-structure implementation of the abstract data type. It is also shown that these ideals lead naturally to monitors for data-structure operations.

  3. [Updated medical death documents: Medical Death Certificate and the Birth Statistics Bulletin].

    Science.gov (United States)

    Cirera, Lluís; Segura, Andreu

    2010-08-01

    Public health physicians have constantly urged that the Medical Death Certificate (CMD in Spain) and the notification of perinatal deaths be adapted to WHO standards. The new CMD came into effect in January 2009, whilst significant changes were made to the Birth Statistics Bulletin (BEP acronym in Spanish) in 2007. In this article the certifying doctor is informed on their novel and key aspects. The health significance of this medico-legal act is emphasised. At the same time associated issues are mentioned that still need to be resolved in Spain. The CMD unifies the medical certificate and the death statistics bulletin on one form and complies with WHO recommendations. It asks whether the death has been the result of an already registered traffic or work accident, and if an autopsy (clinical) has been performed. For place of death, it means the place where the cadaver has been recognised and the death certified. The approximate time of the causes of death must also be indicated. The BEP registers the births and deaths in labour. It includes the education level and occupation levels of the mother and father, and still has the number of weeks gestation and the birth weight in grams. Notification of legal deaths and perinatal deaths still need to be improved; the confidential transfer of causes of death to doctors and researchers; and death statistics according to cause with less delay between the events and their availability and publication.

  4. Key Theories from Critical Medical Anthropology for Public Health Research. Part II: Medicine in the Social System, Medicine as a Social System

    Directory of Open Access Journals (Sweden)

    Jennifer J. Carroll

    2014-06-01

    Full Text Available This article summarizes four significant theoretical concepts from the field of Critical Medical Anthropology in two parts: in the first part, biopower/discipline and explanatory models; in the second, structural violence, and identity politics and biological citizenship. The four subjects reviewed here have been chosen for their importance to our understanding of human behaviors related to health and illness, as well as for the impact that they can have on theory, research, and practice in the field of public health. These critical theories can provide new ways of thinking about professional roles, medical decisions, disease diagnosis and etiology, treatment adherence, prevention messaging, and all sorts of health-related behaviors and systems of understanding. They can also help public health researchers shed light on the human beliefs and activities that shape patterns of disease within and across populations. Whether a research question is being formulated or research findings are being analyzed, the critical social theories outlined here can foster a more holistic understanding of the human element in any public health project.

  5. Efficient Certificate Management in VANET

    CERN Document Server

    Samara, Ghassan

    2012-01-01

    Vehicular Ad hoc Networks is one of the most challenging research area in the field of Mobile Ad Hoc Networks, in this research We propose a flexible, simple, and scalable design for VANET certificates, and new methods for efficient certificate management, which will Reduce channel overhead by eliminating the use of CRL, and make Better certificate Revocation Management. Also it will increase the security of the network and helps in identifying the adversary vehicle.

  6. CFPC's Certification Examination: An overview

    OpenAIRE

    Handfield-Jones, Richard; Hollingworth, Gary R

    1990-01-01

    The certification examination of the College of Family Physicians of Canada is designed to assess the extent to which the College's educational objectives have been achieved. Since the first examination in 1969, more than 7000 physicians have received their certification. The authors describe the basic elements of this test and the process through which the Committee on Examinations designs and sets the examination. The authors comment on the role of the certification process in the education...

  7. CERTIFICATION - The final and critical stage of every civil or military aviation program

    Directory of Open Access Journals (Sweden)

    Vasile STEFAN

    2012-06-01

    Full Text Available As a general rule the final step in every aviation program is the certification of the airplane, an important step in which the airplane, the engins and the equipments are checked by an authority or commission according to the airworthiness rules. The main scope of the certification is to promote a safe aviation product and to protect the general public from unnecessary risk. In all the contries the national authorieties require a civil certificability for all the parts or equipments and a full aircraft certification for a new or wholly modified airplane. The military aircrafts must pased and respond to a specific way of certification and many actual efforts are done in order to unify the diffrent national rules in this field. This paper presents the existing situation in the certification of civil and military airplans and the actual measures done for the unification of certification procedures in the world.

  8. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    Institute of Scientific and Technical Information of China (English)

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  9. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  10. COSPAS-SARSAT Beacon Certification Facility

    Data.gov (United States)

    Federal Laboratory Consortium — EPG's COSPAS-SARSAT Beacon Certification Facility is one of five certification facilities in the world. Formal certifications are available for all beacon types and...

  11. 77 FR 70176 - Previous Participation Certification

    Science.gov (United States)

    2012-11-23

    ... URBAN DEVELOPMENT Previous Participation Certification AGENCY: Office of the Chief Information Officer... digital submission of all data and certifications is available via HUD's secure Internet systems. However...: Previous Participation Certification. OMB Approval Number: 2502-0118. Form Numbers: HUD-2530 ....

  12. Legal value of clinical competence and its certification

    Directory of Open Access Journals (Sweden)

    Antonino Zagari

    2013-03-01

    Full Text Available What is the legal value of the assessment and certification of professional skills and competence? The certification of skills can be defined as a process by which a third party gives written assurance that a person satisfies all requirements needed to operate to the highest professional standards in a specific field. Today, the certification of skill scan have a legal value in the context of professional responsibility when a judge has to assess the degree of expertise of a doctor who is under investigation for malpractice. From a legal point of view, it has some value regarding credits for professional appointments or career development within the state system. It is desirable that more and more both national and regional legislation should use the system of certification of skills through accredited third-parties to improve and assess the performance of professionals and the institutions and structures in which they operate. The system of certification of skills has to become part of the requirements for the accreditation of public and private facilities that provide services to the national health service. We believe that the certification of skills not only helps to recognize human intellectual capital, which is the main value of a healthcare organization, but also facilitates decisions about career paths and the construction of an effective training and study curriculum and portfolio.

  13. Reviewing the Language Compensation Policy in the National Senior Certificate

    Science.gov (United States)

    Taylor, Stephen

    2014-01-01

    The National Senior Certificate or "matric" examination is a key point of access to further education and the labour market in South Africa. Since 1999, matric candidates whose first language is not Afrikaans or English and are, therefore, forced to write in a second or third language have received a compensation of five per cent of…

  14. 75 FR 62008 - Safety Management System for Certificated Airports

    Science.gov (United States)

    2010-10-07

    .... Safety Risk Management (SRM) This proposal would require a certificate holder to establish an SRM process... production or operations decisions. An SMS has four key components: Safety Policy, Safety Risk Management... details management's responsibility and accountability for safety. Safety Risk Management (SRM). As a core...

  15. Fair Trade Flowers: Global Certification, Environmental Sustainability, and Labor Standards

    Science.gov (United States)

    Raynolds, Laura T.

    2012-01-01

    This article analyzes the organization of the fair trade flower industry, integration of Ecuadorian enterprises into these networks, and power of certification to address key environmental and social concerns on participating estates. Pursuing a social regulatory approach, I locate fair trade within the field of new institutions that establish and…

  16. Improving System Security and User Privacy in Secure Electronic Transaction (SET with X.509 v3 Certificate

    Directory of Open Access Journals (Sweden)

    Saidu Muhammad

    2015-04-01

    Full Text Available With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET as an open encryption and security specification designed to protect credit card transaction on the internet. This paper proposes a new approach for increasing security by avoiding privacy violation using Public Key Infrastructure, X.509 certificate and Format Preservation encryption method, the credit card number is encrypted using public key algorithm and re-encrypted using Format preservation Encryption algorithm and finally stored in the X.509 version 3 certificate private extensions. This technique can be used to improve the security of the user credit card information against card fraud or the compromise of data associated with the account.

  17. 基于单向哈希函数的证书撤销机制%NEW CERTIFICATE REVOCATION SCHEME BASED ON ONE-WAY HASH-FUNCTION

    Institute of Scientific and Technical Information of China (English)

    李金; 李杰

    2008-01-01

    证书撤销是公钥基础设施PKI(Public Key Infrastructure)研究和应用的难点问题.首先讨论了当前应用最广泛的两类证书撤销机制:证书撤销列表CRL(Certificate Revocation List)和在线证书状态协议OCSP(0nline Certificate Status Protoco1),剖析了这两种机制各自存在的不足.在此基础上,提出了一种基于单向哈希函数的证书撤销机制.

  18. PULSE Pilot Certification Results

    Directory of Open Access Journals (Sweden)

    Pamela Pape-Lindstrom

    2015-08-01

    Full Text Available The pilot certification process is an ambitious, nationwide endeavor designed to motivate important changes in life sciences education that are in line with the recommendations of the 2011 Vision and Change Report: A Call to Action (American Association for the Advancement of Science [AAAS], 2011.  It is the goal of the certification process to acknowledge departments that have progressed towards full implementation of the tenets of Vision and Change and to motivate departments that have not begun to adopt the recommendations to consider doing so.  More than 70 life science departments applied to be part of the pilot certification process, funded by a National Science Foundation grant, and eight were selected based on initial evidence of transformed and innovative educational practices.  The programs chosen represent a wide variety of schools, including two-year colleges, liberal-arts institutions, regional comprehensive colleges, research universities and minority serving institutions.  Outcomes from this pilot were released June 1, 2015 (www.pulsecommunity.org, with all eight programs being recognized as having progressed along a continuum of change.  Five levels of achievement were defined as PULSE Pilot Progression Levels.  Of the eight departments in the pilot, one achieved “PULSE Progression Level III: Accomplished”.  Six departments achieved “PULSE Progression Level II: Developing” and one pilot department achieved “PULSE Progression Level I: Beginning”.  All of the schools have made significant movement towards the recommendations of Vision and Change relative to a traditional life sciences curriculum.  Overall, the response from the eight pilot schools has been positive. 

  19. 36 CFR 67.6 - Certifications of rehabilitation.

    Science.gov (United States)

    2010-07-01

    ... rehabilitation. 67.6 Section 67.6 Parks, Forests, and Public Property NATIONAL PARK SERVICE, DEPARTMENT OF THE... REVENUE CODE OF 1986 § 67.6 Certifications of rehabilitation. (a) Owners who want rehabilitation projects..., thus qualifying as a certified rehabilitation, shall comply with the procedures listed below. A fee,...

  20. 22 CFR 61.3 - Certification and authentication criteria.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Certification and authentication criteria. 61.3 Section 61.3 Foreign Relations DEPARTMENT OF STATE PUBLIC DIPLOMACY AND EXCHANGES WORLD-WIDE FREE FLOW OF... timely current events (newsreels, newscasts, or other forms of “spot” news). (6) Stimulates the use of a...

  1. 10 CFR Appendix A to Part 34 - Radiographer Certification

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Radiographer Certification A Appendix A to Part 34 Energy NUCLEAR REGULATORY COMMISSION LICENSES FOR INDUSTRIAL RADIOGRAPHY AND RADIATION SAFETY REQUIREMENTS FOR... of industrial radiography; 2. Make its membership available to the general public nationwide that...

  2. Research capacity and culture of the Victorian public health allied health workforce is influenced by key research support staff and location.

    Science.gov (United States)

    Williams, Cylie; Miyazaki, Koki; Borkowski, Donna; McKinstry, Carol; Cotchet, Matthew; Haines, Terry

    2015-06-01

    The aim of the present study was to identify and understand the self-rated research capacity and culture of the allied health workforce. METHODS. The present study was a cross-sectional survey. The Research Capacity and Culture tool was disseminated to all Victorian public health allied health departments. General demographic data were also collected, including the presence of an organisational allied health research lead. Five hundred and twenty fully completed surveys were returned by participants; all allied health disciplines and all grades were represented. One hundred and eighty-six participants had an organisational allied health research lead and 432 were located in a metropolitan-based health service. There were significant differences (P organisational and team research skills between those with and without a research lead, together with those in different service locations (metropolitan vs non-metropolitan). Higher self-ratings in individual research skills (P organisational level has a flow-down effect on research capacity and culture.

  3. 卫生应急关键技术筛选框架设计与结果分析*%Research on the Framework Design of Selecting Key Techniques of Public Health Emergency Response and the Analysis of Results

    Institute of Scientific and Technical Information of China (English)

    吴群红; 胥娇; 郝艳华; 宁宁

    2013-01-01

      目的:探讨卫生应急关键技术概念、内涵、筛选框架、原则及方法。方法:运用头脑风暴法及专题讨论法,构建卫生应急关键技术筛选框架,通过议题小组法明确卫生应急关键技术筛选标准,运用德尔菲法筛选关键技术。结果:设计了基于突发公共卫生事件分类、生命周期处置流程、技术层次、技术范畴的四维卫生应急关键技术研究框架,通过平均算术法和秩和法筛选了包括一级、二级技术在内的9大类共59项基层迫切需要的卫生应急关键技术集。结论:卫生应急关键技术的框架设计和筛选方法具有科学性、实用性和可操作性,研究可为今后进一步遴选、研究和开发关键技术提供概念框架和工具指南。%Objective: To explore the concept, connotation, selection framework, principles and methods of selecting the key techniques of health emergency. Methods: By using method of brainstorming and focused group discussion, the framework of selecting the key techniques of public health emergency was constructed, the criteria for key techniques selection was developed through nominal group discussion method;then a set of key techniques were identified through nominal group discussion method. Results:The framework for selecting key techniques was designed based on four dimensions: the classification of emergency events, life cycle of emergency response, level of techniques and technique category; based on the results of arithmetic average and rank sum method, 59 key techniques out of 9 types were selected. Conclusion: Selection framework and method of public health emergency key techniques are scientific, feasible, and applicable, which provide the conceptual framework and guideline for further research.

  4. Are you considering organic certification?

    Science.gov (United States)

    Organic certification was developed in recognition of the necessity for consistent standards across the U.S. for the benefit of producers, processors, wholesalers, retailers, and consumers. Prior to establishment of federal guidelines (National Organic Program) for organic certification in 2002, a ...

  5. SWEB: An Advanced Mobile Residence Certificate Service

    Science.gov (United States)

    Papastergiou, Spyridon; Polemi, Despina; Douligeris, Christos

    The design and development of an enhanced network infrastructure in combination with the adoption of new technologies, standards and architectural styles for the design, development and implementation of new platforms can give a significant push to the deployment of advanced mobile services in the area of public administration. In this context, we present an innovative m-government platform that provides an advanced mobile Residence Certificate service. The proposed platform is an interoperable, affordable, secure and scalable solution that addresses a set of crucial requirements such as security, user friendliness, interoperability, accessibility and scalability.

  6. 基于McEliece公钥密码体制的盲签名算法研究%Blind Signature Scheme Based on McEliece Public Key Cryptosystem

    Institute of Scientific and Technical Information of China (English)

    赵程程; 李子臣; 刘念; 阎晓妲

    2012-01-01

    Due to the threat of quantum computer on public - key cryptography, the public key cryptosystems against quantum computing has become the focus of research in information security field. A blind sig- nature based on McEliece public key cryptography was proposed aiming at protecting of consumers'anonymi- ty. By Hash on a message and blind process ensure signed message and behavior cannot be linked. At the same time the signature of receiver's identity is kept secret and will never be leaked out, with unconditional intractability and security for this kind of blind signature is analyzed. Result shows that this model has the advantages of inheriting the security of McEliece public-key cryptography, having the general basic proper- ties of digital signatures and blind signatures, resisting quantum computer attack and eventually has a very strong security.%由于量子计算机对现用公钥密码体制的威胁,抵抗量子计算的公钥密码体制已经成为信息安全领域研究的重点。针对消费者的匿名性保护问题,本文提出一种基于McEliece公钥密码体制的盲签名算法。通过对消息进行Hash,盲化和去盲过程,保证签名的消息与签署行为不可链接,且永远不会被泄露,具有无条件不可追踪性。文章还对这种盲签名的安全性进行分析,分析结果表明,此模型既继承了McEliece公钥密码体制的安全性,能抵抗量子计算机的攻击,也具有一般数字签名和盲签名的基本性质,具有很强的安全性。

  7. Propuesta de aplicación de un sistema de Infraestructura de Clave Pública (Public Key Infrastructure "PKI" y los Certificados Digitales en la trazabilidad de productos agrícolas

    Directory of Open Access Journals (Sweden)

    Juan Carlos Sepúlveda Peña

    2009-01-01

    Full Text Available Hoy día la trazabilidad de los productos y las actividades en la cadena de suministro se han convertido en un nuevo factor a tener en cuenta en la cadena de distribución de alimentos y la agroindustria. Cada vez más, consumidores en muchas partes del mundo demandan de pruebas verificables de trazabilidad como uno criterio importante de la calidad / inocuidad de los productos alimenticios. El presente artículo propone una solución a esta problemática introduciendo el uso de un sistema de Infraestructura de Clave Pública (Public Key Infrastructure "PKI" y los certificados digitales (CD.

  8. Health statistics - Key data on health 2002 (Data 1970-2001 Luxembourg: Office for Official Publications of the European Communities,2002

    Directory of Open Access Journals (Sweden)

    Antonio G. de Belvis

    2004-06-01

    Full Text Available

    Since 1990s, the European institutions have been discussing on the importance to establish a Health
    Indicators Monitoring System.

    This system would: undertake a “critical review of existing health data and indicators; develop appropriate methods for the collection of the progressively comparable health data needed to establish these indicators; develop a reliable system for the transfer and sharing of health data and indicators, essentially by means of the telematic interchange of data; identify methods and tools required for conducting analyses and producing reports on state of health, trends and determinants, and the impact of health-related policies” (according to the speech made by the European Commission representative, Mr. Frédéric Sicard, during the former EUPHA Conference held in Rome, last November.
    These are the outcomes of the Health statistics — Key data on health 2002, issued on March 8th 2004 and prepared by the Office for National Statistics (ONS, United Kingdom, and the sector ‘Health and safety’, of Unit E.3 (Education, health and culture of Eurostat, on behalf of the European Commission.

  9. NASA's EOSDIS, Trust and Certification

    Science.gov (United States)

    Ramapriyan, H. K.

    2017-01-01

    NASA's Earth Observing System Data and Information System (EOSDIS) has been in operation since August 1994, managing most of NASA's Earth science data from satellites, airborne sensors, filed campaigns and other activities. Having been designated by the Federal Government as a project responsible for production, archiving and distribution of these data through its Distributed Active Archive Centers (DAACs), the Earth Science Data and Information System Project (ESDIS) is responsible for EOSDIS, and is legally bound by the Office of Management and Budgets circular A-130, the Federal Records Act. It must follow the regulations of the National Institute of Standards and Technologies (NIST) and National Archive and Records Administration (NARA). It must also follow the NASA Procedural Requirement 7120.5 (NASA Space Flight Program and Project Management). All these ensure that the data centers managed by ESDIS are trustworthy from the point of view of efficient and effective operations as well as preservation of valuable data from NASA's missions. Additional factors contributing to this trust are an extensive set of internal and external reviews throughout the history of EOSDIS starting in the early 1990s. Many of these reviews have involved external groups of scientific and technological experts. Also, independent annual surveys of user satisfaction that measure and publish the American Customer Satisfaction Index (ACSI), where EOSDIS has scored consistently high marks since 2004, provide an additional measure of trustworthiness. In addition, through an effort initiated in 2012 at the request of NASA HQ, the ESDIS Project and 10 of 12 DAACs have been certified by the International Council for Science (ICSU) World Data System (WDS) and are members of the ICSUWDS. This presentation addresses questions such as pros and cons of the certification process, key outcomes and next steps regarding certification. Recently, the ICSUWDS and Data Seal of Approval (DSA) organizations

  10. Impact of Malaysian Institute of Accountants’ Certification on the Practice of Accounting in Malaysia

    Directory of Open Access Journals (Sweden)

    Kabiru Isa Dandago

    2013-03-01

    Full Text Available This paper identifies and reviews the impact of accounting professional certificate, obtained through Malaysian Institute of Accountants’ (MIA membership, on the practice of accounting in Malaysia. The study is categorized into two main impact assessments: 1 The impact of MIA certificate on accounting practitioners, and 2 The impact of MIA certificate on academicians or educators. As for information and data collection, two methods are used: namely verbal interview and content analysis. Based on the results obtained from both methods, it is clear that MIA certificate yields positive impact on the practice of accounting in Malaysia in the areas of: 1 building credentials and reputation; 2 building skills, knowledge and ethical development; and 3 higher income for the holders of the certificate. These results indicate that MIA certificate holders possess better working attractions than others with background knowledge of accounting but do not hold the certificate. It is, therefore, recommended that graduates of accounting should make effort to qualify for MIA certificate, or similar internationally recognized certificates, for them to be better practitioners or scholars in the field of accounting, in the best interest of their country and beyond. It is also recommended that MIA should be regularly conducting impact assessment on the quality of the services provided by its members in both the public and private sectors for quality assurance and image safeguard.

  11. Depth keying

    Science.gov (United States)

    Gvili, Ronen; Kaplan, Amir; Ofek, Eyal; Yahav, Giora

    2003-05-01

    We present a new solution to the known problem of video keying in a natural environment. We segment foreground objects from background objects using their relative distance from the camera, which makes it possible to do away with the use of color for keying. To do so, we developed and built a novel depth video camera, capable of producing RGB and D signals, where D stands for the distance to each pixel. The new RGBD camera enables the creation of a whole new gallery of effects and applications such as multi-layer background substitutions. This new modality makes the production of real time mixed reality video possible, as well as post-production manipulation of recorded video. We address the problem of color spill -- in which the color of the foreground object is mixed, along its boundary, with the background color. This problem prevents an accurate separation of the foreground object from its background, and it is most visible when compositing the foreground objects to a new background. Most existing techniques are limited to the use of a constant background color. We offer a novel general approach to the problem with enabling the use of the natural background, based upon the D channel generated by the camera.

  12. Promoting awareness of key resources for evidence-informed decision making in public health: An evaluation of a webinar series about knowledge translation methods and tools

    Directory of Open Access Journals (Sweden)

    Jennifer eYost

    2016-04-01

    awareness and stimulating use of resources for evidence-informed decision making and knowledge translation in public health practice.

  13. Promoting Awareness of Key Resources for Evidence-Informed Decision-making in Public Health: An Evaluation of a Webinar Series about Knowledge Translation Methods and Tools.

    Science.gov (United States)

    Yost, Jennifer; Mackintosh, Jeannie; Read, Kristin; Dobbins, Maureen

    2016-01-01

    stimulating use of resources for evidence-informed decision-making and knowledge translation in public health practice.

  14. An exploratory assessment of the attitudes of Chinese wood products manufacturers towards forest certification.

    Science.gov (United States)

    Chen, Juan; Innes, John L; Kozak, Robert A

    2011-11-01

    Interviews with Chinese forest products manufacturers were conducted to explore their attitudes towards forest certification and related issues. Participants comprised owners, CEOs, and managers in 20 Chinese wood products companies, including producers of furniture, doors, flooring, and various engineered wood products. The interviews were used to analyze the extent to which participants were considering adopting forest certification and what might motivate such a decision. This was done by assessing their awareness and knowledge of certification. The results indicated that participants' understanding of forest certification was extremely low, despite major efforts in China to raise awareness of the issue. Potential economic benefits were the most frequently cited reason to adopt certification, including gaining or maintaining competitive advantage over their industry counterparts, improved access to both domestic and export markets, better customer recognition, and enhanced corporate responsibility practices. Some interviewees (3 out of 20) considered that certification would become a mandatory requirement or industry standard, and that this would be the only viable motivation for certification given that the financial benefits were potentially limited. According to the participants, the main differences between certified and uncertified wood products operations related to improved market access and public image. Interviewees felt that cooperation between and support from governments and the forest industry would enable the enhanced awareness of certification amongst manufacturers and the general public. This, in turn, could serve to stimulate demand for certified products.

  15. Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme

    Institute of Scientific and Technical Information of China (English)

    Yueh-Min Huang; Hua-Yi Lin; Tzone-I Wang

    2006-01-01

    Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide on-line access to a trusted authority server. Therefore,applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities.This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed.The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices.

  16. CAUSES OF VISUAL DISABILITY IN PATIENTS WITH VISUAL DISABILITY CERTIFICATES OBTAINED IN A TERTIARY CARE HOSPITAL IN MUMBAI

    OpenAIRE

    Vikas Vijaykumar Kamat; Chhaya Ashok Shinde

    2016-01-01

    BACKGROUND Visual disability is a major public health problem in developing countries. Ocular diseases cause partial or total blindness. Causes can be treatable or non-treatable. Non-treatable causes lead to permanent visual disability. Persons with disabilities are given certificates mentioning percentage of disability after they demand certificates for various benefits. MATERIALS AND METHODS Records of the individuals who had been issued visual disability certificates duri...

  17. 45 CFR 95.509 - Cost allocation plan amendments and certifications.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Cost allocation plan amendments and certifications. 95.509 Section 95.509 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION GENERAL ADMINISTRATION-GRANT PROGRAMS (PUBLIC ASSISTANCE, MEDICAL ASSISTANCE AND STATE CHILDREN'S HEALTH...

  18. Public-key Encryption Based on Extending Discrete Chebyshev Polynomials' Definition Domain to Real Number%基于实数域扩散离散Chebyshev多项式的公钥加密算法

    Institute of Scientific and Technical Information of China (English)

    陈宇; 韦鹏程

    2011-01-01

    将Chebyshev多项式与模运算相结合,对其定义在实数域上进行了扩展,经过理论验证和数据分析,总结出实数域多项式应用于公钥密码的一些性质.利用RSA公钥算法和EIGamal公钥算法的算法结构,提出基于有限域离散Chebyshev多项式的公钥密码算法.该算法结构类似于RSA算法,其安全性基于大数因式分解的难度或者与El-Gamal的离散对数难度相当,能够抵抗对于RSA的选择密文攻击,并且易于软件实现.%By combining Chebyshev polynomials with modulus compute,extending Chebyshev polynomials' definition domain to real number, some conclusions were drawn by theoretic verification and data analysis. Making use of the framework of the traditional public-key algorithm RSA and ElGamal, proposed a chaotic public-key encryption algorithm based on extending discrete Chebyshev polynomials' definition domain to Real number. Its security is based on the intractability of the integer factorization problem as RSA,and it is able to resist the chosen cipher-text attack against RSA and easy to be implemented.

  19. 40 CFR 92.208 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Certification. 92.208 Section 92.208... POLLUTION FROM LOCOMOTIVES AND LOCOMOTIVE ENGINES Certification Provisions § 92.208 Certification. (a) This... the application for certification, test reports and data acquired from a freshly...

  20. 21 CFR 80.31 - Certification.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Certification. 80.31 Section 80.31 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE CERTIFICATION Certification Procedures § 80.31 Certification. (a) If the Commissioner determines, after...

  1. 16 CFR 306.6 - Certification.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Certification. 306.6 Section 306.6... RATINGS, CERTIFICATION AND POSTING Duties of Refiners, Importers and Producers § 306.6 Certification. In... half number equal to or less than the number determined by you. This letter of certification will...

  2. 40 CFR 91.208 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Certification. 91.208 Section 91.208... Certification. (a) In the application for certification a manufacturer must: (1) Submit a statement that the engines for which certification is requested will not, to the best of the manufacturer's belief, cause...

  3. 40 CFR 94.208 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Certification. 94.208 Section 94.208... EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Certification Provisions § 94.208 Certification. (a) If, after a review of the application for certification, test reports and data acquired from an engine...

  4. 40 CFR 92.306 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Certification. 92.306 Section 92.306... POLLUTION FROM LOCOMOTIVES AND LOCOMOTIVE ENGINES Certification Averaging, Banking, and Trading Provisions § 92.306 Certification. (a) In the application for certification a manufacturer or remanufacturer...

  5. 19 CFR 10.180 - Certification.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Certification. 10.180 Section 10.180 Customs... Frozen Beef § 10.180 Certification. (a) The foreign official's meat-inspection certificate required by U... certification below when fresh, chilled, or frozen beef is to be entered under the provisions of...

  6. 40 CFR 89.209 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Certification. 89.209 Section 89.209... Provisions § 89.209 Certification. (a) In the application for certification a manufacturer must: (1) Declare...) Submit a statement that the engines for which certification is requested will not, to the best of...

  7. 49 CFR 624.7 - Certification.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Certification. 624.7 Section 624.7 Transportation... TRANSPORTATION CLEAN FUELS GRANT PROGRAM § 624.7 Certification. The applicant must use the certification contained in the Annual Notice of Assurances and Certifications published in the Federal Register...

  8. 2010 Guide to National Board Certification

    Science.gov (United States)

    National Board for Professional Teaching Standards, 2010

    2010-01-01

    This "Guide to National Board Certification" introduces teachers to the assessment process and provides them with useful information as they apply for National Board Certification or certification renewal, or order the "Take One!"[R] professional development kit. By participating in the National Board Certification process, teachers are joining…

  9. 5 CFR 1639.24 - Certification.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Certification. 1639.24 Section 1639.24... Certification. (a) The Board will provide a certification to the paying agency in all cases in which: (1) The... to appear at a hearing. (b) The certification must be in writing and must include: (1) A...

  10. 7 CFR 1216.70 - Certification.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Certification. 1216.70 Section 1216.70 Agriculture... INFORMATION ORDER Peanut Promotion, Research, and Information Order Certification of Peanut Producer Organizations § 1216.70 Certification. (a) Organizations receiving certification from the Secretary will...

  11. 40 CFR 90.208 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Certification. 90.208 Section 90.208... EMISSIONS FROM NONROAD SPARK-IGNITION ENGINES AT OR BELOW 19 KILOWATTS Certification Averaging, Banking, and Trading Provisions § 90.208 Certification. (a) In the application for certification a manufacturer...

  12. 26 CFR 1.43-3 - Certification

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 1 2010-04-01 2010-04-01 true Certification 1.43-3 Section 1.43-3 Internal... § 1.43-3 Certification (a) Petroleum engineer's certification of a project—(1) In general. A petroleum... requirements of section 43(c)(2)(A). A petroleum engineer's certification must be submitted for each...

  13. 5 CFR 179.208 - Certification.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Certification. 179.208 Section 179.208... Salary Offset § 179.208 Certification. (a) OPM salary offset coordinator shall provide a certification to... certification must be in writing and must state: (1) That the employee owes the debt; (2) The amount and...

  14. 46 CFR 107.258 - Crane certification.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Crane certification. 107.258 Section 107.258 Shipping... CERTIFICATION Inspection and Certification § 107.258 Crane certification. (a) The Coast Guard may accept current... West 44th Street, New York, NY 10036, on the Internet at http://www.icgb.com. (b) Crane...

  15. 40 CFR 94.306 - Certification.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Certification. 94.306 Section 94.306... EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Certification Averaging, Banking, and Trading Provisions § 94.306 Certification. (a) In the application for certification a manufacturer must: (1) Declare...

  16. National Guidelines for Digital Camera Systems Certification

    Science.gov (United States)

    Yaron, Yaron; Keinan, Eran; Benhamu, Moshe; Regev, Ronen; Zalmanzon, Garry

    2016-06-01

    Digital camera systems are a key component in the production of reliable, geometrically accurate, high-resolution geospatial products. These systems have replaced film imaging in photogrammetric data capturing. Today, we see a proliferation of imaging sensors collecting photographs in different ground resolutions, spectral bands, swath sizes, radiometric characteristics, accuracies and carried on different mobile platforms. In addition, these imaging sensors are combined with navigational tools (such as GPS and IMU), active sensors such as laser scanning and powerful processing tools to obtain high quality geospatial products. The quality (accuracy, completeness, consistency, etc.) of these geospatial products is based on the use of calibrated, high-quality digital camera systems. The new survey regulations of the state of Israel specify the quality requirements for each geospatial product including: maps at different scales and for different purposes, elevation models, orthophotographs, three-dimensional models at different levels of details (LOD) and more. In addition, the regulations require that digital camera systems used for mapping purposes should be certified using a rigorous mapping systems certification and validation process which is specified in the Director General Instructions. The Director General Instructions for digital camera systems certification specify a two-step process as follows: 1. Theoretical analysis of system components that includes: study of the accuracy of each component and an integrative error propagation evaluation, examination of the radiometric and spectral response curves for the imaging sensors, the calibration requirements, and the working procedures. 2. Empirical study of the digital mapping system that examines a typical project (product scale, flight height, number and configuration of ground control points and process). The study examine all the aspects of the final product including; its accuracy, the product pixels size

  17. Renewable Energy Certificate Program

    Energy Technology Data Exchange (ETDEWEB)

    Gwendolyn S. Andersen

    2012-07-17

    This project was primarily to develop and implement a curriculum which will train undergraduate and graduate students at the University seeking a degree as well as training for enrollees in a special certification program to prepare individuals to be employed in a broad range of occupations in the field of renewable energy and energy conservation. Curriculum development was by teams of Saint Francis University Faculty in the Business Administration and Science Departments and industry experts. Students seeking undergraduate and graduate degrees are able to enroll in courses offered within these departments which will combine theory and hands-on training in the various elements of wind power development. For example, the business department curriculum areas include economic modeling, finance, contracting, etc. The science areas include meteorology, energy conversion and projection, species identification, habitat protection, field data collection and analysis, etc.

  18. Evaluation of Ecological Criteria of Biofuel Certification in Germany

    Directory of Open Access Journals (Sweden)

    Kirsten Selbmann

    2016-09-01

    Full Text Available The share of biofuels has increased significantly over the last decade, which has lead to several negative impacts on the environment. As a solution, several governments worldwide have promoted the use of certification systems, which have been implemented and in some cases have even been established as mandatory regulations. Due to the focus of the public debate, standard-setting has mainly been limited to developing and newly industrializing countries. Hence, the issues of environmental impacts as a consequence of agricultural intensification in Germany has been given little attention, and the question whether existing biofuel certification systems sufficiently cover ecological issues remains. In order to answer this question, this study performs a benchmarking analysis of selected certification systems, whereby their ability to ensure ecological sustainability is evaluated and compared. The assessment reveals that the currently existing national ordinances, like Cross Compliance, are in many aspects insufficient to ensure sustainability. Contrarily, they often deter necessary discussions to tackle these issues.

  19. 对短公钥的基于身份数字签名算法的安全性攻击∗%Attacks on Identity-based Digital Signature Algorithm with Short Public Key

    Institute of Scientific and Technical Information of China (English)

    郑红; 范佳

    2015-01-01

    An identity-based digital signature scheme with short public key is discussed. Two kinds of attacks on this algorithm indi-cates that this algorithm could not fairly satisfy the claimed security requirement. More specifically, Type I attacker could calculate all other users′valid private keys, if he gets one user′s private key. Type II attacker is able to forge a user′s signature on any other messa-ges if he gets this user′s one signature.%研究了一个具有短公钥特征的基于身份的数字签名算法。通过两种安全性攻击,指出该算法并不满足其所声称的安全性。运用第一种攻击,如果攻击者获得某个用户私钥,则他可以计算系统内所有其他用户的合法私钥。运用第二种攻击,如果攻击者获得了某个用户的一个合法签名,则他可以伪造该用户对任意其他消息的合法签名。

  20. Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities

    Science.gov (United States)

    Stevens, Marc; Lenstra, Arjen; de Weger, Benne

    We present a novel, automated way to find differential paths for MD5. As an application we have shown how, at an approximate expected cost of 250 calls to the MD5 compression function, for any two chosen message prefixes P and P', suffixes S and S' can be constructed such that the concatenated values P||S and P'||S' collide under MD5. Although the practical attack potential of this construction of chosen-prefix collisions is limited, it is of greater concern than random collisions for MD5. To illustrate the practicality of our method, we constructed two MD5 based X.509 certificates with identical signatures but different public keys and different Distinguished Name fields, whereas our previous construction of colliding X.509 certificates required identical name fields. We speculate on other possibilities for abusing chosen-prefix collisions. More details than can be included here can be found on www.win.tue.nl/hashclash/ChosenPrefixCollisions/.