1,894 research outputs found
Void growth in high strength aluminium alloy single crystals : a CPFEM based study
The author thankfully acknowledges the financial support of EPSRC funding (EP/L021714/1).Peer reviewedPostprin
Secure spontaneous emergency access to personal health record
We propose a system which enables access to the user's Personal Health Record (PHR) in the event of emergency. The
access typically occurs in an ad-hoc and spontaneous manner and the user is usually unconscious, hence rendering the
unavailability of the user's password to access the PHR. The
proposed system includes a smart card carried by the user
at all time and it is personalized with a pseudo secret, an
URL to the PHR Server, a secret key shared with the PHR
Server and a number of redemption tokens generated using
a hash chain. In each emergency session, a one-time use
redemption token is issued by the smart card, allowing the
emergency doctor to retrieve the user's PHR upon successful authentication of his credentials and validation of the
redemption token. The server returns the PHR encrypted
with a one-time session key which can only be decrypted by
the emergency doctor. The devised interaction protocol to
facilitate emergency access to the user's PHR is secure and
efficient
Pengaruh Bimbingan Manajemen Diri dalam Meningkatkan Kedisiplinan Belajar Siswa
The study was helt in atirah I senior high school grade XI at Makassar city the purpose is to know (1) the process and results of implementation of self management guidance in improving learning discipline experimental group students of. (2) the level of learnig discipline to learn the experimental group before and after the self-management guidance services. (3) the level of learning discipline of the control group before and after teach by giving information about the desciplane. (4) whether there are differences between the application of self-management guidance and information services in improving the efficientcy of learn discipline. This research uses and experimental approach (True Experimental Designs) in the form of pretest-posttest control group design. This study used data collection techniques by questionnaires, observation and evaluation of the understanding. Data analysis using descriptive statistical analysis of Wilcoxon signed ranks test. The results of this study indicate (1) The process of experimentel was running well. (2) level of discipline studying students before the experimental group was given self-management guidance services that are in the low category, while the level of discipline to learn the experimental group of students after being given self-management guidance services are in high category. (3) The level of discipline to learn the control group before and after teacing through information services remain at a low category, (4) there is a difference in learning discipline of experiental group student which giving self management guidance, and control groub students which giving information service
Hierarchical attribute-based encryption and decryption
A domain authority 13 for use in a hierarchy of domain authorities in a hierarchical cryptographic system. The domain authority 13 comprises a user secret key generator 21 for generating a user secret key based on a domain secret key and one or more attribute representations, to obtain a user secret key associated with a set of attributes corresponding to the attribute representations, and wherein the domain secret key is based on a domain secret key of a parent domain authority or a root secret key of a root authority of the hierarchy of domain authorities, and wherein the attribute representations are independent of the hierarchy.A decrypter makes use of the user secret key. An encrypter generates ciphertext decryptable by the decrypter
- …