441 research outputs found

    Review of The Electronic Transaction Ordinance: Can The Personal Identification Number Replace The Digital Signature?

    Get PDF
    In a recent consultation document, the Information Technology and Broadcasting Bureau proposed that personal identification numbers (PINs) be accepted as a form of signature for the purposes of the Electronic Transactions Ordinance (ETO) (Cap 553). This article explains why this proposal is fundamentally flawed. The article identifies three basic requirements for a signature and examines whether they are satisfied by digital signatures and PINs. It concludes that while a digital signature has built into it all the elements necessary for compliance with the requirements, a PIN can only be used for the purpose of authorisation and cannot be elevated to the status of a signature as required by the ETO.published_or_final_versio

    Digital evidence search kit

    Get PDF
    With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that can assist law enforcement agencies in cyber crime evidence collection. This paper describes a cyber crime evidence collection tool called DESK (Digital Evidence Search Kit), which is the product of several years of cumulative efforts of our Center together with the Hong Kong Police Force and several other law enforcement agencies of the Hong Kong Special Administrative Region. We will use DESK to illustrate some of the desirable features of an effective cyber crime evidence collection tool. © 2005 IEEE.published_or_final_versio

    Study of Beauveria bassiana growth, blastospore yield, desiccation-tolerance, viability and toxic activity using different liquid media

    Get PDF
    Beauveria bassiana was grown on three liquid media containing casaminoacids, corn steep liquor or peptone. After incubation, the blastospore counts reached 6.38 × 109 blastospores/ml, in the medium containing sucrose and corn steep liquor, which was significantly higher than the obtained with media containing casaminoacids or peptone. The medium containing corn steep liquor produced predominately submerged conidia, meanwhile the other media produced blastospores. The blastospores produced in the medium containing casaminoacids presented faster germination rates, than the blastospores produced in media containing corn steep liquor or peptone, although, after airdrying, were observed significant reductions on the viability of blastospores produced in the media composed by casaminoacids or peptone, but the spores produced in the medium with corn steep liquor were not affected. For storage of blastospores at 4 and 26°C after some months, the blastospores produced in the medium with casaminoacids showed the highest viability at 26°C, whereas at 4°C the counts of viable blastospores produced in medium containing corn steep liquor were significantly higher than the counts of blastospores produced in the other media with casaminoacids or peptone. The blastospores maintained for six months at 4°C showed high mortality against third-instar Plutella xylostella larvae.Key words: Beauveria bassiana, liquid media, fermentation, short times of propagation, biological control, entomopathogen fungus

    Protecting digital legal professional privilege LPP data

    Get PDF
    The Best Paper AwardTo enable free communication between legal advisor and his client for proper functioning of the legal system, certain documents, known as Legal professional privilege (LPP) documents, can be excluded as evidence for prosecution. In physical world, protection of LPP information is well addressed and proper procedure for handling LPP articles has been established. However, there does not exist a forensically sound procedure for protecting 'digital' LPP information. In this paper, we try to address this important, but rarely addressed, issue. We point out the difficulties of handling digital LPP data and discuss the shortcomings of the current practices, then we propose a feasible procedure for solving this problem. © 2008 IEEE.published_or_final_versionThe 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2008), Oakland, CA., 22 May 2008. In Proceedings of the 3rd SADFE, 2008, p. 91-10

    Separable and anonymous identity-based key issuing

    Get PDF
    In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a secure channel is required. For privacy-oriented applications, it is important to keep in secret whether the private key corresponding to a certain identity has been requested. All of the existing ID-based key issuing schemes have not addressed this anonymity issue. Besides, the separation of duties of LRA and KGC has not been discussed as well. We propose a novel separable and anonymous ID-based key issuing scheme without secure channel. Our protocol supports the separation of duties between LRA and KGC. The private key computed by the KGC can be sent to the user in an encrypted form such that only the legitimate key requester authenticated by LRA can decrypt it, and any eavesdropper cannot know the identity corresponding to the secret key. © 2005 IEEE.published_or_final_versio

    A BRiTE Journey: 2013–2019

    Get PDF
    Resilience is widely acknowledged as important for teacher success, yet how to assist pre-service teachers build the skills and strategies for professional resilience is a question often asked by teacher educators. This chapter overviews the design, development and features of a series of five online learning modules designed to support pre-service teacher resilience. The BRiTE modules were informed by an analysis of the literature and content created to address the key themes. Five modules were developed: Building resilience, Relationships, Wellbeing, Taking initiative and Emotions. Each module was designed to be interactive and personalised, enabling users to build their personal toolkit to support their resilience. Since their launch in 2015, the modules have been widely used by pre-service teachers, teachers and a range of stakeholders with over 14,000 registered users at the beginning of 2020. Potential for future use in supporting teacher resilience is discussed

    Comparison of flow characteristics and vascular reactivity of radial artery and long saphenous vein grafts [NCT00139399]

    Get PDF
    BACKGROUND: The morphological and functional differences between arteries and veins may have implications on coronary artery bypass graft (CABG) survival. Although subjective differences have been observed between radial artery (RA) and long saphenous venous (LSV) grafts, these have not been quantified. This study assessed and compared the flow characteristics and in-vivo graft flow responses of RA and LSV aorto-coronary grafts. METHODS: Angiograms from 52 males taken 3.7 ± 1.0 months after CABG surgery were analyzed using adjusted Thrombolysis in Myocardial Infarction (TIMI) frame count. Graft and target coronary artery dimensions were measured using quantitative coronary angiography. Estimated TIMI velocity (V(E)) and volume flow (F(E)) were then calculated. A further 7 patients underwent in-vivo graft flow responses assessments to adenosine, acetylcholine and isosorbide dinitrate (ISDN) using intravascular Doppler. RESULTS: The V(E )for RA grafts was significantly greater than LSV grafts (P = 0.002), however there was no difference in volume F(E )(P = 0.20). RA grafts showed positive endothelium-dependent and -independent vasodilatation, and LSV grafts showed no statistically significant response to adenosine and acetylcholine. There was no difference in flow velocity or volume responses. Seven RA grafts (11%) had compromised patency (4 (6%) ≥ 50% stenosis in the proximal/distal anastomoses, and 3 (5%) diffuse narrowing). Thirty-seven (95%) LSV grafts achieved perfect patency and 2 (5%) were occluded. CONCLUSION: The flow characteristics and flow responses of the RA graft suggest that it is a more physiological conduit than the LSV graft. The clinical relevance of the balance between imperfect patency versus the more physiological vascular function in the RA graft may be revealed by the 5-year angiographic follow-up of this trial

    Intrusion detection routers: Design, implementation and evaluation using an experimental testbed

    Get PDF
    In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed. The system, known as intrusion detection router (IDR), is deployed on network routers to perform online detection on any DDoS attack event, and then react with defense mechanisms to mitigate the attack. The testbed is built up by a cluster of sufficient number of Linux machines to mimic a portion of the Internet. Using the testbed, we conduct real experiments to evaluate the IDR system and demonstrate that IDR is effective in protecting the network from various DDoS attacks. © 2006 IEEE.published_or_final_versio

    Recent advances in electronic structure theory and their influence on the accuracy of ab initio potential energy surfaces

    Get PDF
    Recent advances in electronic structure theory and the availability of high speed vector processors have substantially increased the accuracy of ab initio potential energy surfaces. The recently developed atomic natural orbital approach for basis set contraction has reduced both the basis set incompleteness and superposition errors in molecular calculations. Furthermore, full CI calculations can often be used to calibrate a CASSCF/MRCI approach that quantitatively accounts for the valence correlation energy. These computational advances also provide a vehicle for systematically improving the calculations and for estimating the residual error in the calculations. Calculations on selected diatomic and triatomic systems will be used to illustrate the accuracy that currently can be achieved for molecular systems. In particular, the F+H2 yields HF+H potential energy hypersurface is used to illustrate the impact of these computational advances on the calculation of potential energy surfaces
    corecore