115 research outputs found

    The Proposed Development of Prototype with Secret Messages Model in Whatsapp Chat

    Get PDF
    Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section

    Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding

    Get PDF
    In this paper, we propose two different solutions for making a recently proposed asymmetric fingerprinting protocol based on client-side embedding robust to collusion attacks. The first solution is based on projecting a client-owned random fingerprint, securely obtained through existing cryptographic protocols, using for each client a different random matrix generated by the server. The second solution consists in assigning to each client a Tardos code, which can be done using existing asymmetric protocols, and modulating such codes using a specially designed random matrix. Suitable accusation strategies are proposed for both solutions, and their performance under the averaging attack followed by the addition of Gaussian noise is analytically derived. Experimental results show that the analytical model accurately predicts the performance of a realistic system. Moreover, the results also show that the solution based on independent random projections outperforms the solution based on Tardos codes, for different choices of parameters and under different attack models

    Johnson Space Center Research and Technology 1993 Annual Report

    Get PDF
    Johnson Space Center research and technology accomplishments during fiscal year 1993 are described and principle researchers and technologists are identified as contacts for further information. Each of the four sections gives a summary of overall progress in a major discipline, followed by detailed, illustrated descriptions of significant tasks. The four disciplines are Life Sciences, Human Support Technology, Solar Systems Sciences, and Space Systems Technology. The report is intended for technical and management audiences throughout the NASA and worldwide aerospace community. An index lists project titles, funding codes, and principal investigators

    Dynamic block encryption with self-authenticating key exchange

    Get PDF
    One of the greatest challenges facing cryptographers is the mechanism used for key exchange. When secret data is transmitted, the chances are that there may be an attacker who will try to intercept and decrypt the message. Having done so, he/she might just gain advantage over the information obtained, or attempt to tamper with the message, and thus, misguiding the recipient. Both cases are equally fatal and may cause great harm as a consequence. In cryptography, there are two commonly used methods of exchanging secret keys between parties. In the first method, symmetric cryptography, the key is sent in advance, over some secure channel, which only the intended recipient can read. The second method of key sharing is by using a public key exchange method, where each party has a private and public key, a public key is shared and a private key is kept locally. In both cases, keys are exchanged between two parties. In this thesis, we propose a method whereby the risk of exchanging keys is minimised. The key is embedded in the encrypted text using a process that we call `chirp coding', and recovered by the recipient using a process that is based on correlation. The `chirp coding parameters' are exchanged between users by employing a USB flash memory retained by each user. If the keys are compromised they are still not usable because an attacker can only have access to part of the key. Alternatively, the software can be configured to operate in a one time parameter mode, in this mode, the parameters are agreed upon in advance. There is no parameter exchange during file transmission, except, of course, the key embedded in ciphertext. The thesis also introduces a method of encryption which utilises dynamic blocks, where the block size is different for each block. Prime numbers are used to drive two random number generators: a Linear Congruential Generator (LCG) which takes in the seed and initialises the system and a Blum-Blum Shum (BBS) generator which is used to generate random streams to encrypt messages, images or video clips for example. In each case, the key created is text dependent and therefore will change as each message is sent. The scheme presented in this research is composed of five basic modules. The first module is the key generation module, where the key to be generated is message dependent. The second module, encryption module, performs data encryption. The third module, key exchange module, embeds the key into the encrypted text. Once this is done, the message is transmitted and the recipient uses the key extraction module to retrieve the key and finally the decryption module is executed to decrypt the message and authenticate it. In addition, the message may be compressed before encryption and decompressed by the recipient after decryption using standard compression tools

    Implantable Microsystem Technologies For Nanoliter-Resolution Inner Ear Drug Delivery

    Get PDF
    Advances in protective and restorative biotherapies have created new opportunities to use site-directed, programmable drug delivery systems to treat auditory and vestibular disorders. Successful therapy development that leverages the transgenic, knock-in, and knock-out variants of mouse models of human disease requires advanced microsystems specifically designed to function with nanoliter precision and with system volumes suitable for implantation. The present work demonstrates a novel biocompatible, implantable, and scalable microsystem consisted of a thermal phase-change peristaltic micropump with wireless control and a refillable reservoir. The micropump is fabricated around a catheter microtubing (250 μm OD, 125 μm ID) that provided a biocompatible leak-free flow path while avoiding complicated microfluidic interconnects. Direct-write micro-scale printing technology was used to build the mechanical components of the pump around the microtubing directly on the back of a printed circuit board assembly. In vitro characterization results indicated nanoliter resolution control over the desired flow rates of 10–100 nL/min by changing the actuation frequency, with negligible deviations in presence of up to 10× greater than physiological backpressures and ±3°C ambient temperature variation. A biocompatibility study was performed to evaluate material suitability for chronic subcutaneous implantation and clinical translational development. A stand-alone, refillable, in-plane, scalable, and fully implantable microreservoir platform was designed and fabricated to be integrated with the micropump. The microreservoir consists two main components: a cavity for storing the drug and a septum for refilling. The cavity membrane is fabricated with thin Parylene-C layers, using a polyethylene glycol (PEG) sacrificial layer. The septum thickness is minimized by pre-compression down to 1 mm. The results of in vitro characterization indicated negligible restoring force for the optimized cavity membrane and thousands of punctures through the septum without leakage. The micropump and microreservoir were integrated into microsystems which were implanted in mice. The microtubing was implanted into the round window membrane niche for infusion of a known ototoxic compound (sodium salicylate) at 50 nL/min for 20 min. Real-time shifts in distortion product otoacoustic emission thresholds and amplitudes were measured during the infusion. The results match with syringe pump gold standard. For the first time a miniature and yet scalable microsystem for inner ear drug delivery was developed, enabling drug discovery opportunities and translation to human

    DD u MM YYYY

    Full text link
    This book is the result of three years of collaboration, travel and discourse between the artists Joey Bryniarska and Martin Westwood, and archeologists working in France and Sweden. Brought together through the European Commission funded NEARCH project the book is a companion piece to three large scale diagrams and an audio-visual sculpture. The authors propose a grouping of hagiographic, architectural, administrative, physiologic and mediatic motifs as grounds to describe their encounters with archeologists, archaeological and inter/trans-disciplinary methods in general. The attic of a gothic cathedral, the rumour of a contaminated spoil heap on an archipelago, an underground carpark and the remainders of a decapitation, are some of the sites sketched, in order to develop the dynamics of: communication/isolation; access/exclusion; division/unity. Contrasting minor textual and visual genres: the postcard, the travelogue, the sketched diagram and the email; along with historical narrative, speculative writing (both analytic and imaginary) and a critique of disciplinary processes, we have aimed to merge both lived and historical experience in order to articulate relations within and between fields of research and practice. This publication is concerned with relaying historical and contemporary information through the description of specific collaborative environments, to propose analogies for the affective encounters experienced. The aim is to present an instance calibrating these three factors

    CPA\u27s guide to information security

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1963/thumbnail.jp

    The Murray Ledger and Times, December 17, 1994

    Get PDF

    An Enfolding and Fertile Abyss: Rhetoric as the Creative Becoming of Biological Life

    Get PDF
    This dissertation seeks traces of enfolding corporeal paths within the ontological, epistemological, ethical abyss separating Human and Animal. The question of the animal, as it is often called, is currently en vogue within a larger ecological movement in the humanities. I seek to extend this engagement with animality beyond rhetoric, literature, and philosophy by enfolding the sciences and arts as well for a deeper understanding of humans as animals and therefore, I argue, as rhetorical life. This path of the HumAnimal emerges with a diffractive reading of new material feminism, evolutionary biology, contemporary art practices, and visual rhetorics, and in doing so, theorizes a definition of rhetoric that is prior to intention, consciousness, and mind. I argue that rhetoric is instead present at the origins, struggles, and flourishings of life itself. Rhetoric becomes a process, a movement, and a biological becoming that emerges in nonlinear and discontinuous ways, illuminating the dark abyssal waters in which humanimals and animals are mutually and materially enfolded. Given the ethical implications of our entanglements with the world, this dissertation further argues for a different way of looking with animals in visual culture. The representationalist looking that places animals at a distance and visually grasps them is demonstrated with contemporary examples of viral memes as well as the destructive human-animal interactions practiced for capturing selfies and cute photographs. These animals are but objects grasped by human eyes across a staggering ontological divide. I turn to Heidegger\u27s Parmenides to theorize an encountering, being-enabling look for animals in visual culture that ontologically entangles humanimals and animals in the looking relation. Such an encountering look simultaneously brings forth an awareness of one\u27s own being such that the abyssal requisites for self and other, subject and object, human and animal are compromised. An encountering look is essentially a phenomenological awareness of entanglement. These alternative practices of looking become the basis for a HumAnimal rhetorics and pedagogy

    Reducing Internet Latency : A Survey of Techniques and their Merit

    Get PDF
    Bob Briscoe, Anna Brunstrom, Andreas Petlund, David Hayes, David Ros, Ing-Jyh Tsang, Stein Gjessing, Gorry Fairhurst, Carsten Griwodz, Michael WelzlPeer reviewedPreprin
    corecore