50 research outputs found

    Alien Registration- Allard, Rose (Brunswick, Cumberland County)

    Get PDF
    https://digitalmaine.com/alien_docs/31641/thumbnail.jp

    Representation(s): A Mutable Process for a Transitioning Urban Landscape

    Get PDF
    To understand the medium is to understand the affects the medium has on the changes and the scale and form of human association and action over time, not only as the medium is being introduced, but also the unconscious and unforeseeable effects the cultural matrix within which the medium operates. Marshall McLuhan Difference is not simply the collapsing [or circulation] of identity, it is also the rendering of space and time as fragmented, transformable, interpenetrated, beyond any fixed formulation, no longer guaranteed by the a priori or by the universalisms of science. Elizabeth Grosz Media can be leveraged as a way to evaluate and inform the built environment. By using media as more than just a communicative necessity, media is capable of directing process. This process seeks to construct a representational framework and narrative through the investigation and translation of cultural, historical, and conceptual contexts. Architecture, as media, functions as a perceptual tool toward the fusion of process and a meta-physical and physical experience. This thesis asks the question: How can these complex contexts create a framework within which the media operates and informs the built environment? The validity of this research in the context of the culture of architectural education is to show that architecture is more than simply applied knowledge and skills translated through conventions of visual communication. Architecture is a way of seeing and thinking that requires understanding of media beyond the idea of tool and production to an idea of performance, process, and methodology

    Illness Intrusiveness and COVID-19 Preventative Measures

    Get PDF

    Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

    Get PDF
    We analyse the security of database encryption schemes supporting range queries against persistent adversaries. The bulk of our work applies to a generic setting, where the adversary's view is limited to the set of records matched by each query (known as access pattern leakage). We also consider a more specific setting where certain rank information is also leaked. The latter is inherent to multiple recent encryption schemes supporting range queries, including Kerschbaum's FH-OPE scheme (CCS 2015), Lewi and Wu's order-revealing encryption scheme (CCS 2016), and the recently proposed Arx scheme of Poddar et al. (IACR eprint 2016/568, 2016/591). We provide three attacks. First, we consider full reconstruction, which aims to recover the value of every record, fully negating encryption. We show that for dense datasets, full reconstruction is possible within an expected number of queries NlogN+O(N)Nlog⁡N+O(N), where NN is the number of distinct plaintext values. This directly improves on a O(N2logN)O(N2log⁡N) bound in the same setting by Kellaris et al. (CCS 2016). We also provide very efficient, data-optimal algorithms that succeed with the minimum possible number of queries (in a strong, information theoretical sense), and prove a matching data lower bound for the number of queries required. Second, we present an approximate reconstruction attack recovering all plaintext values in a dense dataset within a constant ratio of error (such as a 5% error), requiring the access pattern leakage of only O(N)O(N) queries. We also prove a matching lower bound. Third, we devise an attack in the common setting where the adversary has access to an auxiliary distribution for the target dataset. This third attack proves highly effective on age data from real-world medical data sets. In our experiments, observing only 25 queries was sufficient to reconstruct a majority of records to within 5 years. In combination, our attacks show that current approaches to enabling range queries offer little security when the threat model goes beyond snapshot attacks to include a persistent server-side adversary

    Security of BLS and BGLS signatures in a multi-user setting

    Get PDF
    Traditional single-user security models do not necessarily capture the power of real-world attackers. A scheme that is secure in the single-user setting may not be as secure in the multi-user setting. Inspired by the recent analysis of Schnorr signatures in the multi-user setting, we analyse Boneh-Lynn-Shacham (BLS) signatures and Boneh-Gentry-Lynn-Shacham (BGLS) aggregate signatures in the multi-user setting. We obtain a tight reduction from the security of key-prefixed BLS in the multi-user model to normal BLS in the single-user model. We introduce a multi-user security model for general aggregate signature schemes, in contrast to the original “chosen-key” security model of BGLS that is analogous to the single-user setting of a signature scheme. We obtain a tight reduction from the security of multi-user key-prefixed BGLS to the security of multi-user key-prefixed BLS. Finally, we apply a technique of Katz and Wang to present a tight security reduction from a variant of multi-user key-prefixed BGLS to the computational co-Diffie-Hellman (co-CDH) problem. All of our results for BLS and BGLS use type III pairings

    Malnutrition and Mortality Patterns among Internally Displaced and Non-Displaced Population Living in a Camp, a Village or a Town in Eastern Chad

    Get PDF
    BACKGROUND: Certain population groups have been rendered vulnerable in Chad because of displacement of more than 200,000 people over the last three years as a result of mass violence against civilians in the east of the country. The objective of the study was to assess mortality and nutritional patterns among displaced and non-displaced population living in camps, villages and a town in the Ouddaï and Salamat regions of Chad. METHODOLOGY: Between May and October 2007, two stage, 30-cluster household surveys were conducted among 43,900 internally displaced persons (IDPs) living in camps in Ouaddai region (n = 898 households), among 19,400 non-displaced persons (NDPs) living in 42 villages in Ouaddai region (n = 900 households) and among 17,000 NDPs living in a small town in Salamat region (n = 901 households). Data collection included anthropometric measurements, measles vaccination rates and retrospective mortality. Crude mortality rate (CMR), mortality rate among children younger than 5 years (U5MR), causes of death and the prevalence of wasting (weight-for-height z score <-2) among children aged 6 to 59 months were the main outcome measures. CONCLUSIONS: The CMR among the 4902 IDPs in Gozbeida camps, 4477 NDPs living in a village and 4073 NDPs living in a town surveyed was 1.8 (95% CI, 1.2-2.8), 0.3 (95% CI, 0.2-0.4), 0.3 (95% CI, 0.2-0.5) per 10,000 per day, respectively. The U5MR in a camp (n = 904), a village (n = 956) and a town (n = 901) was 4.1 (95% CI, 2.1-7.7), 0.5 (95% CI, 0.3-0.9) and 0.7 (95% CI, 0.4-1.4) per 10,000 per day, respectively. Diarrhoea was reported to be the main cause of death. Acute malnutrition rates (according to the WHO definition) among 904 IDP children, 956 NDPs children living in a village, 901 NDP children living in a town aged 6 to 59 months were 20.6% (95% CI, 17.9%-23.3%), 16.4% (95% CI, 14.0%-18.8%) and 10.1% (95% CI, 8.1%-12.2%) respectively. The study found a high mortality rate among IDPs and an elevated prevalence of wasting not only in IDP camps but also in villages located in the same region. The town-dweller population remains at risk of malnutrition. Appropriate contingency plans need to be made to ensure acceptable living standards for these populations
    corecore