330 research outputs found

    On the Design and Analysis of a Biometric Authentication System using Keystroke Dynamics

    Full text link
    This paper proposes a portable hardware token for user authentication, it is based on the use of keystroke dynamics to verify users in a bio-metric manner. The proposed approach allows for a multifactor authentication scheme in which users are not allowed access unless they provide the correct password and their unique bio-metric signature. The proposed system is implemented in hardware and its security is evaluated

    Cryptotool: A secure data storage software

    No full text
    Confidentiality and personal information security has always been a big problem in the world of cyberspace. There exist a number of solutions which are based on encryption methods, however such tools are typically file-format specific and/or do not give sufficient control to the user to choose the cryptographic algorithm. In this study, a private key encryption software is presented; it supports two main security features. The first is encryption that supports all file formats and several encryption algorithms such as AES, 3DES and RC2. The second feature is integrity using Hash functions, the latter ensures that unauthorised modifications of stored files can be detected. In addition, the tool has an easy-to-use interface which allows the user to choose from several encryption algorithms and define the encryption key. The software also allows the user to combine a number of cryptographic algorithms to build stronger ciphers for more enhanced security. In addition, the Crypto Tool can be used as an education tool as it supprts a number of classic ciphers and provides opportunity to compare different cryptographic encrypting techniques

    Secure communication interface design for IoT applications, using the GSM network

    No full text
    In this work, a secure short messaging service (SMS)-based communication interface is designed. The interface has applications in the internet of things (IoT) such as machine to machine (M2M) communications, and human-operated remote system management. The case study of waking a personal computer remotely is considered, and a complete proof-of-conceptis implemented for this purpose, using a field-programmable gate array (FPGA)-based receiving device and an Androidbased transmitting device. On the Android device, SMS messages are generated in software using a “rolling code” system based on linear feedback shift registers (LFSRs), then encrypted with the extended tiny encryption algorithm (XTEA) cipher. The FPGA employs both hardware XTEA decryption, and hardware systems to validate incoming messages

    Enhancement techniques for student engagement in cybersecurity education

    No full text
    In order to create successful cybersecurity professionals, it is important to engage students in a way that bridges the gap from the academic to the real world. In this paper, we present three examples used within teaching at Southampton University: The use of real-world scenarios presented through virtual environments, the creation of a cryptography learning platform and the fostering of student communities to support learning through social networking.We explore the ways in which practical hands-on experience based on industry can better support the development skills. We examine how real-life techniques can be combined with gamification and personalised learning to engender positive engagement. We consider how real-world scenarios within the educational institution can be utilised to further learning within in a safe but relevant context, being mutually beneficial to the students and institution. Finally, we consider the role of fostering a strong cybersecurity student community, using social networking, student societies and extra-curricular activities.<br/

    Plectin's role in cytoskeletal remodelling in endothelial cells

    Get PDF
    Plectin ist ein außergewöhnlich großes Protein mit vielen Bindungsdomänen, welches die Cytoskelettfilamentsysteme miteinander verbindet. Weiters stellt Plectin eine Plattform für Signalmoleküle dar. Im Zuge dieser Diplomarbeit wurde die Rolle von Plectin in Endothelzellen näher betrachtet. Zwei unterschiedliche Endothelzelllinien wurden für die durchgeführten Experimente verwendet. Nieren- und Lungenzellen von wildtyp Plectin+/+ und knock-out Plectin-/- Mäusen wurden mittels Polyoma middle T Infektion immortalisiert. Das middle T Antigen verursacht Zellproliferation und bewirkt einen Wachtstumsvorteil von Endothelzellen gegenüber anderen Zelltypen (Williams et al., 1988). Eine genaue Charakterisierung dieser Zelllinien ergab, dass Endothelzell-spezifische Markerproteine in Plectin+/+ und Plectin-/- Zellen exprimiert werden, jedoch wurden reduzierte Mengen von eNOS, Caveolin und VE-Cadherin in Plectin-/- Zellen gefunden. Zellfraktionierungen zeigten, dass Caveolin, eNOS und VE-Cadherin in Plectin-/- Zellen in der Membranfraktion angehäuft sind, während sie in der Cytoskelettfraktion reduziert sind. Messungen von extrazellulärem Stickstoffoxid (NO) zeigten, dass Plectin-/- Endothelzellen weniger NO produzieren als Plectin+/+ Zellen. Weiters, wurden in Plectin-/- Zellen reduzierte Mengen von Gesamt-eNOS und eine verringerte Aktivität von eNOS nachgewiesen. Mechanische Reize, wie vom Blutfluss oder Blutdruck verursachte Scher-kräfte, beeinflussen die Funktionen von Endothelzellen durch das Aktivieren von Mechanosensoren an der Zellmembran. Diese Mechanosensoren wieder-um aktivieren verschiedene Signalwege, welche die Aktivierung und die Ex-pression verschiedener Proteine beeinflussen (Chien, 2006). Plectin+/+ und Plectin-/- Zellen wurden Scherkräften ausgesetzt und durch Immunofluores-zenzmikroskopie und Immunoblots analysiert. Eine erhöhte Expression von eNOS und Caveolin wurde als Antwort auf Schwerkräfte in Plectin+/+ und Plectin-/- Zellen festgestellt, jedoch in geringerem Maße in Plectin-/- Zellen. Des Weiteren, war die Scherkraft-induzierte VE-Cadherin Clusterbildung in Plectin-/- im Vergleich zu Plectin+/+ Zellen stark reduziert. Diese Daten weisen darauf hin, dass Plectin, durch die Regulation von En-dothelzell-spezifischen Molekülen, wie eNOS und VE-Cadherin eine wichtige Rolle in Endothelzellen spielt. Weiters, wurde eine eventuelle Beteiligung von Plectin an der Erkennung und / oder an der Antwort auf Scherkräfte in Endo-thelzellen beobachtet.Plectin, a multi-domain protein of extraordinary large size, is known to connect cytoskeletal filament systems. Furthermore, plectin is supposed to be a scaffolding platform for signalling molecules. In this thesis plectin’s eventual role in regulating endothelial cell (EC) function was investigated. Two different endothelial cell lines were used for analysis. Briefly, cells de-rived from kidneys and lungs of plectin+/+ and plectin-/- mice were immortalized by polyoma middle T infection. The middle T antigene causes cell proliferation and specifically ECs gain proliferation advantage over other cells (Williams et al., 1988). Thorough characterization of these cell lines revealed that EC markers are expressed in both plectin+/+ and plectin-/- ECs, although the total amounts of eNOS, caveolin and VE-cadherin are reduced in plectin-/- ECs. Data obtained from cell fractionation experiments showed that caveolin, eNOS and VE-cadherin are increased in membrane fractions of plectin-/- cells com-pared plectin+/+ ECs at the expense of the cytoskeleton fractions. Measurement of extracellular nitric oxide (NO) demonstrated that plectin-/- ECs produce less NO compared to plectin+/+ ECs. Moreover, plectin-/- cells show reduced levels of total eNOS and reduced activity of eNOS. Mechanical stimuli like shear stress resulting from blood pressure and flow modulate functions of ECs by activating mechanosensors on the cell mem-brane. These in turn activate different signalling pathways modulating the activation state and the expression of different proteins (Chien, 2006). Shear- stressed plectin+/+ and plectin-/- ECs were analysed by immunofluorescence microscopy and immunoblotting. In response to fluid shear stress an upregulation of eNOS and caveolin was observed in both plectin+/+ and plectin-/- ECs, although to a lesser extent in plectin-/- cells. Furthermore, shear stress-induced VE-cadherin cluster formation was significantly reduced in plectin-/- compared to plectin+/+ ECs. Based on these data, it is suggested that in ECs plectin plays a major role as a regulator of EC key molecules like eNOS and VE-cadherin. Furthermore, an eventual involvement of plectin in sensing and / or responding to fluid shear stress was observed

    Le mouvement ou la chair: deux conceptions de la profondeur ontologique selon PatoÄŤka et Merleau-Ponty

    Get PDF
    [In French]Both Patočka and Merleau-Ponty conceive the world not just as an Object, but rather as a field of an irreducible phenomenal and ontological depth. Patočka’s concept of movement and Merleau-Ponty’s concept of flesh are two concrete figures of this depth, and as such they are understood by the respective authors as that what stands at the origin of every singular being so far as it detaches itself on the ground of the world as an open totality. Nevertheless, the position of the two concepts seems to be quite different in relation to the traditional categories of the metaphysics. We argue that Patočka’s concept of movement is profoundly rooted in, and dependent on, the classical oppositions, whereas Merleau-Ponty’s flesh makes it possible to understand them rather as abstractions produced by segregation from the original field of presence. In order to establish these points, we propose an interpretation of Patočka’s and Merleau-Ponty’s understanding of the concepts of horizon and world, and of course of those of movement and flesh. [In French.

    A survey of hardware implementations of elliptic curve cryptographic systems

    No full text
    Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implemenations to hardware/software co-designs. The following review provides an overview of state of the art hardware implemenations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem
    • …
    corecore