1,312 research outputs found

    Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking

    Get PDF
    The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols

    Evaluation of melanin-targeted radiotherapy in combination with radiosensitizing drugs for the treatment of melanoma

    Get PDF
    The incidence of malignant melanoma is rising faster than that of any other cancer in the United States. An [131I]-labeled benzamide - [131I]MIP-1145 - selectively targets melanin, reduces melanoma tumor burden and increases survival in preclinical models. Our purpose was to determine the potential of radiosensitizers to enhance the anti-tumor efficacy of [131I]MIP-1145. Melanotic (A2058) and amelanotic (A375 and SK-N-BE(2c)) cells were treated with [131I]MIP-1145 as a single agent or in combination with drugs with radiosenitizing potential. Cellular uptake of [131I]MIP-1145 and toxicity were assessed in monolayer culture. The interaction between radiosensitizers and [131I]MIP-1145 was evaluated by combination index analysis in monolayer cultures and by delayed growth of multicellular tumor spheroids. [131I]MIP-1145 was taken up by and was toxic to melanotic cells but not amelanotic cells. Combination treatments comprising [131I]MIP-1145 with the topoisomerase inhibitor topotecan or the PARP-1 inhibitor AG014699 resulted in synergistic clonogenic cell kill and enhanced delay of the growth of spheroids derived from melanotic melanoma cells. The proteasome inhibitor bortezomib had no synergistic cytotoxic effect with [131I]MIP-1145 and failed to enhance the delay of spheroid growth. Following combination treatment of amelanotic cells, neither synergistic clonogenic cell kill nor enhanced growth delay of spheroids was observed

    The role of copper in disulfiram-induced toxicity and radiosensitisation of cancer cells.

    Get PDF
    Abstract Disulfiram has been used for several decades in the treatment of alcoholism. It now shows promise as an anti-cancer drug and radiosensitizer. Proposed mechanisms of action include the induction of oxidative stress and inhibition of proteasome activity. Our purpose was to determine the potential of disulfiram to enhance the anti-tumor efficacy of external beam -irradiation and 131I-metaiodobenzylguanidine (131I-MIBG), a radiopharmaceutical used for the therapy of neuroendocrine tumors. Methods: The role of copper in disulfiram-induced toxicity was investigated by clonogenic assay after treatment of human SK-N-BE(2c) neuroblastoma and UVW/NAT glioma cells. Synergistic interaction between disulfiram and radiotherapy was evaluated by combination index analysis. Tumor growth delay was determined in vitro using multicellular tumor spheroids and in vivo using human tumor xenografts in athymic mice. Results: Escalating disulfiram dosage caused a biphasic reduction in the surviving fraction of clonogens. Clonogenic cell kill after treatment with disulfiram concentrations less than 4 M was copper-dependent, whereas cytotoxicity at concentrations greater than 10 M was caused by oxidative stress. The cytotoxic effect of disulfiram was maximal when administered with equimolar copper. Likewise, disulfiram’s radiosensitization of tumor cells was copper-dependent. Furthermore, disulfiram treatment enhanced the toxicity of 131I-MIBG to spheroids and xenografts expressing the noradrenaline transporter. Conclusions: The results demonstrate that (i) the cytotoxicity of disulfiram was copper-dependent; (ii) molar excess of disulfiram relative to copper resulted in attenuation of disulfiram-mediated cytotoxicity; (iii) copper was required for the radiosensitizing activity of disulfiram and (iv) copper-complexed disulfiram enhanced the efficacy not only of external beam radiation but also of targeted radionuclide therapy in the form of 131I-MIBG. Therefore disulfiram may have anti-cancer potential in combination with radiotherapy

    Denial-of-Service Resistance in Key Establishment

    Get PDF
    Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive cryptographic operations in order to authenticate the protocol initiator and to generate the cryptographic keying material that will subsequently be used to secure the communications between initiator and responder. The goal of DoS resistance in key establishment protocols is to ensure that attackers cannot prevent a legitimate initiator and responder deriving cryptographic keys without expending resources beyond a responder-determined threshold. In this work we review the strategies and techniques used to improve resistance to DoS attacks. Three key establishment protocols implementing DoS resistance techniques are critically reviewed and the impact of misapplication of the techniques on DoS resistance is discussed. Recommendations on effectively applying resistance techniques to key establishment protocols are made

    Digital image watermarking: its formal model, fundamental properties and possible attacks

    Get PDF
    While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes

    In Search of Homo Economicus: Behavioral Experiments in 15 Small-Scale Societies

    Get PDF
    We can summarize our results as follows. First, the canonical model is not supported in any society studied. Second, there is considerably more behavioral variability across groups than had been found in previous cross-cultural research, and the canonical model fails in a wider variety of ways than in previous experiments. Third, group-level differences in economic organization and the degree of market integration explain a substantial portion of the behavioral variation across societies: the higher the degree of market integration and the higher the payoffs to cooperation, the greater the level of cooperation in experimental games. Fourth, individual-level economic and demographic variables do not explain behavior either within or across groups. Fifth, behavior in the experiments is generally consistent with economic patterns of everyday life in these societies

    Unification modulo a partial theory of exponentiation

    Full text link
    Modular exponentiation is a common mathematical operation in modern cryptography. This, along with modular multiplication at the base and exponent levels (to different moduli) plays an important role in a large number of key agreement protocols. In our earlier work, we gave many decidability as well as undecidability results for multiple equational theories, involving various properties of modular exponentiation. Here, we consider a partial subtheory focussing only on exponentiation and multiplication operators. Two main results are proved. The first result is positive, namely, that the unification problem for the above theory (in which no additional property is assumed of the multiplication operators) is decidable. The second result is negative: if we assume that the two multiplication operators belong to two different abelian groups, then the unification problem becomes undecidable.Comment: In Proceedings UNIF 2010, arXiv:1012.455

    Privacy Preserving Multi-Server k-means Computation over Horizontally Partitioned Data

    Full text link
    The k-means clustering is one of the most popular clustering algorithms in data mining. Recently a lot of research has been concentrated on the algorithm when the dataset is divided into multiple parties or when the dataset is too large to be handled by the data owner. In the latter case, usually some servers are hired to perform the task of clustering. The dataset is divided by the data owner among the servers who together perform the k-means and return the cluster labels to the owner. The major challenge in this method is to prevent the servers from gaining substantial information about the actual data of the owner. Several algorithms have been designed in the past that provide cryptographic solutions to perform privacy preserving k-means. We provide a new method to perform k-means over a large set using multiple servers. Our technique avoids heavy cryptographic computations and instead we use a simple randomization technique to preserve the privacy of the data. The k-means computed has exactly the same efficiency and accuracy as the k-means computed over the original dataset without any randomization. We argue that our algorithm is secure against honest but curious and passive adversary.Comment: 19 pages, 4 tables. International Conference on Information Systems Security. Springer, Cham, 201
    corecore