158 research outputs found

    Greater Expectations?

    Get PDF
    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs

    Recent Advances in SMAP RFI Processing

    Get PDF
    The measurements made by the Soil Moisture Active/Passive (SMAP) mission are affected by the presence of Radio Frequency Interference (RFI) in the protected 1400-1427 MHz band. In SMAP data processing, the main protection against RFI is a sophisticated RFI detection algorithm which flags sub-samples in time and frequency that are contaminated by RFI and removes them before estimating the brightness temperature. This contribution presents two additional approaches that have been developed to address the RFI concern in SMAP. The first consists in locating sources of RFI; once located, it becomes possible to report RFI sources to spectrum management authorities, which can lead to less RFI being experienced by SMAP in the future. The second is a new RFI detection method that is based on detecting outliers in the spatial distribution of measured antenna temperatures

    Using Resonances to Control Chaotic Mixing within a Translating and Rotating Droplet

    Full text link
    Enhancing and controlling chaotic advection or chaotic mixing within liquid droplets is crucial for a variety of applications including digital microfluidic devices which use microscopic ``discrete'' fluid volumes (droplets) as microreactors. In this work, we consider the Stokes flow of a translating spherical liquid droplet which we perturb by imposing a time-periodic rigid-body rotation. Using the tools of dynamical systems, we have shown in previous work that the rotation not only leads to one or more three-dimensional chaotic mixing regions, in which mixing occurs through the stretching and folding of material lines, but also offers the possibility of controlling both the size and the location of chaotic mixing within the drop. Such a control was achieved through appropriate tuning of the amplitude and frequency of the rotation in order to use resonances between the natural frequencies of the system and those of the external forcing. In this paper, we study the influence of the orientation of the rotation axis on the chaotic mixing zones as a third parameter, as well as propose an experimental set up to implement the techniques discussed.Comment: 15 pages, 6 figure

    Defining appropriateness in coach-athlete sexual relationships: The voice of coaches

    Get PDF
    The sporting culture, with omnipotent coaches, fierce competition for recognition and funding, and ‘win at all cost’ ethos, creates an environment conducive to sexual exploitation of athletes. Recent increased public awareness and the development of child protection policies in sport have led to the questioning of previously accepted coach-athlete relationships. This study is an exploratory investigation into male swimming coaches’ perceptions of appropriateness of coach-athlete sexual relationships. Sexual relationships with athletes under the age of 16 were unanimously considered totally inappropriate. With regard to sexual relationships with athletes above the age of consent for heterosexual sex, opinions ranged from “totally inappropriate” to “it’s a question of civil liberties.” These results are discussed in relation to how coaches have adapted their own behaviours in the face of public scrutiny but are still reluctant to restrict the rights of their fellow coaches

    Kondo Effect in a Metal with Correlated Conduction Electrons: Diagrammatic Approach

    Full text link
    We study the low-temperature behavior of a magnetic impurity which is weakly coupled to correlated conduction electrons. To account for conduction electron interactions a diagrammatic approach in the frame of the 1/N expansion is developed. The method allows us to study various consequences of the conduction electron correlations for the ground state and the low-energy excitations. We analyse the characteristic energy scale in the limit of weak conduction electron interactions. Results are reported for static properties (impurity valence, charge susceptibility, magnetic susceptibility, and specific heat) in the low-temperature limit.Comment: 16 pages, 9 figure

    Efficient Verifiable Computation of XOR for Biometric Authentication

    Full text link
    This work addresses the security and privacy issues in remotebiometric authentication by proposing an efficient mechanism to verifythe correctness of the outsourced computation in such protocols.In particular, we propose an efficient verifiable computation of XORingencrypted messages using an XOR linear message authenticationcode (MAC) and we employ the proposed scheme to build a biometricauthentication protocol. The proposed authentication protocol is bothsecure and privacy-preserving against malicious (as opposed to honest-but-curious) adversaries. Specifically, the use of the verifiable computation scheme together with an homomorphic encryption protects the privacy of biometric templates against malicious adversaries. Furthermore, in order to achieve unlinkability of authentication attempts, while keeping a low communication overhead, we show how to apply Oblivious RAM and biohashing to our protocol. We also provide a proof of security for the proposed solution. Our simulation results show that the proposed authentication protocol is efficient

    A Role for the RNA Chaperone Hfq in Controlling Adherent-Invasive Escherichia coli Colonization and Virulence

    Get PDF
    Adherent-invasive Escherichia coli (AIEC) has been linked with the onset and perpetuation of inflammatory bowel diseases. The AIEC strain LF82 was originally isolated from an ileal biopsy from a patient with Crohn's disease. The pathogenesis of LF82 results from its abnormal adherence to and subsequent invasion of the intestinal epithelium coupled with its ability to survive phagocytosis by macrophages once it has crossed the intestinal barrier. To gain further insight into AIEC pathogenesis we employed the nematode Caenorhabditis elegans as an in vivo infection model. We demonstrate that AIEC strain LF82 forms a persistent infection in C. elegans, thereby reducing the host lifespan significantly. This host killing phenotype was associated with massive bacterial colonization of the nematode intestine and damage to the intestinal epithelial surface. C. elegans killing was independent of known LF82 virulence determinants but was abolished by deletion of the LF82 hfq gene, which encodes an RNA chaperone involved in mediating posttranscriptional gene regulation by small non-coding RNAs. This finding reveals that important aspects of LF82 pathogenesis are controlled at the posttranscriptional level by riboregulation. The role of Hfq in LF82 virulence was independent of its function in regulating RpoS and RpoE activity. Further, LF82Δhfq mutants were non-motile, impaired in cell invasion and highly sensitive to various chemical stress conditions, reinforcing the multifaceted function of Hfq in mediating bacterial adaptation. This study highlights the usefulness of simple non-mammalian infection systems for the identification and analysis of bacterial virulence factors

    The complex light-curve of the afterglow of GRB071010A

    Get PDF
    We present and discuss the results of an extensive observational campaign devoted to GRB071010A, a long-duration gamma-ray burst detected by the Swift satellite. This event was followed for almost a month in the optical/near-infrared (NIR) with various telescopes starting from about 2min after the high-energy event. Swift-XRT observations started only later at about 0.4d. The light-curve evolution allows us to single out an initial rising phase with a maximum at about 7min, possibly the afterglow onset in the context of the standard fireball model, which is then followed by a smooth decay interrupted by a sharp rebrightening at about 0.6d. The rebrightening was visible in both the optical/NIR and X-rays and can be interpreted as an episode of discrete energy injection, although various alternatives are possible. A steepening of the afterglow light curve is recorded at about 1d. The entire evolution of the optical/NIR afterglow is consistent with being achromatic. This could be one of the few identified GRB afterglows with an achromatic break in the X-ray through the optical/NIR bands. Polarimetry was also obtained at about 1d, just after the rebrightening and almost coincident with the steepening. This provided a fairly tight upper limit of 0.9% for the polarized-flux fraction.Comment: 11 pages, 3 figures, MNRAS, in pres

    The complex light-curve of the afterglow of GRB071010A

    Get PDF
    We present and discuss the results of an extensive observational campaign devoted to GRB071010A, a long-duration gamma-ray burst detected by the Swift satellite. This event was followed for almost a month in the optical/near-infrared (NIR) with various telescopes starting from about 2min after the high-energy event. Swift-XRT observations started only later at about 0.4d. The light-curve evolution allows us to single out an initial rising phase with a maximum at about 7min, possibly the afterglow onset in the context of the standard fireball model, which is then followed by a smooth decay interrupted by a sharp rebrightening at about 0.6d. The rebrightening was visible in both the optical/NIR and X-rays and can be interpreted as an episode of discrete energy injection, although various alternatives are possible. A steepening of the afterglow light curve is recorded at about 1d. The entire evolution of the optical/NIR afterglow is consistent with being achromatic. This could be one of the few identified GRB afterglows with an achromatic break in the X-ray through the optical/NIR bands. Polarimetry was also obtained at about 1d, just after the rebrightening and almost coincident with the steepening. This provided a fairly tight upper limit of 0.9% for the polarized-flux fraction.Comment: 11 pages, 3 figures, MNRAS, in pres
    corecore