807 research outputs found

    Stresses in a rotating tapered disk with noncentral holes

    Get PDF
    Ph.D.James H. Armstron

    Algorithm-Based Secure and Fault Tolerant Outsourcing of Matrix Computations

    No full text
    page number : 7 , Extended abstractWe study interactive algorithmic schemes for outsourcing matrix computations on untrusted global computing infrastructures such as clouds or volunteer peer-to-peer platforms. In these schemes the client outsources part of the computation with guaranties on both the inputs' secrecy and output's integrity. For the sake of efficiency, thanks to interaction, the number of operations performed by the client is almost linear in the input/output size, while the number of outsourced operations is of the order of matrix multiplication. Our scheme is based on efficient linear codes (especially evaluation/interpolation version of Reed-Solomon codes). Confidentiality is ensured by encoding the inputs using a secret generator matrix, while fault tolerance is ensured together by using fast probabilistic verification and high correction capability of the code. The scheme can tolerate multiple malicious errors and hence provides an efficient solution beyond resilience against soft errors. These schemes also allow to securely compute multiplication of a secret matrix with a known public matrix. Under reasonable hypotheses, we further prove the non-existence of such unconditionally secure schemes for general matrices

    (Un)Safe Browsing

    Get PDF
    Users often accidentally or inadvertently click ma- licious phishing or malware website links, and in doing so they sacrifice secret information and sometimes even fully compromise their devices. These URLs are intelligently scripted to remain inconspicuous over the Internet. In light of the ever increasing number of such URLs, new ingenious strategies have been in- vented to detect them and inform the end user when he is tempted to access such a link. The Safe Browsing technique provides an exemplary service to identify unsafe websites and notify users and webmasters allowing them to protect themselves from harm. In this work, we show how to turn Google Safe Browsing services against itself and its users. We propose several Distributed Denial- of-Service attacks that simultaneously affect both the Google Safe Browsing server and the end user. Our attacks leverage on the false positive probability of the data structures used for malicious URL detection. This probability exists because a trade- off was made between Google's server load and client's memory consumption. Our attack is based on the forgery of malicious URLs to increase the false positive probability. Finally we show how Bloom filter combined with universal hash functions and prefix lengthening can fix the problem

    Performances of Cryptographic Accumulators

    No full text
    International audienceCryptographic accumulators are space/time efficient data structures used to verify if a value belongs to a set. They have found many applications in networking and distributed systems since their in- troduction by Benaloh and de Mare in 1993. Despite this popularity, there is currently no performance evaluation of the different existing de- signs. Symmetric and asymmetric accumulators are used likewise without any particular argument to support either of the design. We aim to es- tablish the speed of each design and their application's domains in terms of their size and the size of the values

    A Privacy Analysis of Google and Yandex Safe Browsing

    Get PDF
    Google and Yandex Safe Browsing are popular services included in many webbrowsers to prevent users from visiting phishing or malware website links. If Safe Browsing servicesprotect their users from losing private information, they also require that their servers receivebrowsing information on the very same users. In this paper, we present an analysis of Googleand Yandex Safe Browsing services from a privacy perspective. We quantify the privacy providedby these services by analyzing the possibility of re-identifying a URL visited by a client. Wehence challenge Google’s privacy policies where they claim that Google can not recover URLsvisited by its users. Our analysis and experimental results show that Google and Yandex SafeBrowsing can potentially be used as a tool to track specific classes of individuals. Additionally, ourinvestigations on the data currently included in Yandex Safe Browsing provides a concrete set ofURLs/domains that can be re-identified without much effort

    FORMULATION AND EVALUATION OF SEABUCKTHORN LEAF EXTRACT LOADED ETHOSOMAL GEL.

    Get PDF
    Objective: The objective of present research work is develop an ethosome as a carrier system for 75% ethanolic SBT leaf extract, its incorporationin to gel formulations and to characterize the prepared is to develop ethosomes and gel formulations using various parameters including estimationof total phenol content in terms of Gallic Acid Equivalents (GAE). Seabuckthorn (Hippophae rhamnoids. SBT) is a cold desert medicinal plant, and hashigh antioxidant content, especially phenol content. There are many reports revealing pharmacological potential of SBT extracts, however, only fewliterature reports highlight the conversion of these extract in to suitable dosage.Methods: Twelve batches (F1 – F12) of ethosomes were prepared using Soyaphosphatidylcholine (SPC) (1-3%) and ethanol (10-40%). Carbopol934P was used to prepare ethosomal gel. The range of entrapment efficiency (EE) of ethosomes was 51.05%-91.09%, polydispersity index (PDI)ranges between 0.041-0.392 and vesicle size from 96.98 nm to 395 nm. Four ethosomal batches were selected on the basis of EE and PDI to be used forfurther incorporation in to 4 gel formulations (G1, G2, G3 & G4, respectively). Prepared gels were then evaluated for their physicochemical properties,drug content and diffusion characteristics.Results: The pH of the gel formulations was found to be in the range of 6.2 to 6.6. Viscosities of the gels were ranging between 4900 - 4550 centipoises.The drug content of the gels ranged between 46.47% - 82.47%. The cumulative release of ethosomal gel was maximum in G4 formulation (94.34%)and minimum in G1 (70.75%). These ethosomes, when converted in to gels, were found to show good physicochemical properties, drug content anddiffusion pattern.Conclusion: The present study revealed ethosomal gel as an efficient carrier for herbal extract.Keywords: Ethanol, Hippophae rhamnoides, Soyaphosphatidylcholine, Total phenol content

    A Review on Enhancement of SRAM Memory Cell

    Get PDF
    In this field research paper explores the design and analysis of Static Random Access Memory (SRAMs) that focuses on optimizing delay and power. CMOS SRAM cell consumes very little power and has less read and write time. Higher cell ratios will decrease the read and write time and improve stability. PMOS semiconductor unit with fewer dimensions reduces the ability consumption. During this paper, 6T SRAM cell is implemented with reduced power and performance is good according to read and write time, delay and power consumption. It's been noticed typically that increased memory capability will increase the bit-line parasitic capacitance that successively slows down voltage sensing, to avoid this drawback use optimized scaling techniques and more, get improve performance of the design. Memories are a core part of most of the electronic systems. Performance in terms of speed and power dissipation is the major area of concern in today's memory technology. During this paper SRAM cells supported 6T, 9T, and 8T configurations are compared based on performance for reading and write operations. During this paper completely different static random access memory is designed to satisfy low power, high-performance circuit and also the extensive survey on options of various static random access memory (SRAM) designs were reported. Improve performance static random access memory based on designing a low power SRAM cell structure with optimum write access power

    Identifying Coordination Problems in Software Development:Finding Mismatches between Software and Project Team Structures

    Get PDF
    Today's dynamic and iterative development environment brings significant challenges for software project management. In distributed project settings, "management by walking around" is no longer an option and project managers may miss out on key project insights. The TESNA (TEchnical Social Network Analysis) method and tool aims to provide project managers both a method and a tool for gaining insights and taking corrective action. TESNA achieves this by analysing a project's evolving social and technical network structures using data from multiple sources, including CVS, email and chat repositories. Using pattern theory, TESNA helps to identify areas where the current state of the project's social and technical networks conflicts with what patterns suggest. We refer to such a conflict as a Socio-Technical Structure Clash (STSC). In this paper we report on our experience of using TESNA to identify STSCs in a corporate environment through the mining of software repositories. We find multiple instances of three STSCs (Conway's Law, Code Ownership and Project Coordination) in many of the on-going development projects, thereby validating the method and tool that we have developed
    • …
    corecore