282 research outputs found

    Simple Nudges for Better Password Creation

    Get PDF
    Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords

    DER PARTISANENSPUR DURCH VORGEBIRGE NACHGEHEND

    Get PDF
    Autor opisuje razvoj partizanskog pokreta (od kraja 1941. i početka 1942. do siječnja 1945.) i borbene akcije partizanskih jedinica koje su poduzele tijekom Drugoga svjetskog rata u Podgorju.Ende 1941 und Anfang 1942 viele fortschrittliche Bewohner des Senjer Gebirges — von Jurjevo bis Karlobag — wurden die Mitarbeiter der Volksbefreiungsbewegung. Ende 1942 und Anfang 1943 wurde die Partisanenabteilung errichtet. Sie gab einen grossen Beitrag zum Aufstand und zum Volksbefreiuneskrieg auf dem Gebiet des Kroatischen Kustenlandes. Eine Reihe von Kampfleistungen wurde von den Kämpfern aus dieser Abteilung ausgefuhrt, die Mitarbeit des Volkes wurde ausgebreitet und die italienische Kapitulation wurde bereit erwartet. Diese Abteilung gewann grosse Verdienste bei der italienischen Kapitulation auf den Inseln Rab und Pag. Dort half sie den geformten Kampfgruppen in der Abrüstung des Feindes. Auf diesem ganze befreiten Gebiet wurde die Volksbehörde herrgestellt, aber Anfang 1944 drangen in Senj und in das Vorgebirge starke deutsche Kräfte ein, und Senj wurde wieder okkupiert. Das erneuerte Terror verursachte eine Unsicherheit bei dem Volk. Die einheimischen Aktivisten stellten mit Hilfe des See- und Küstensektors (POS) eine andere Militäreinheit — eine neue Abteilung her. Sie stellte sich dem Feinde gegeniiber und gewann — dank dem Waffenkampf — das Zutrauen des Volkes

    CHANGES IN DYNAMIC LEFT VENTRICULAR FUNCTION, ASSESSED BY THE STRAIN-VOLUME LOOP, RELATE TO REVERSE REMODELLING AFTER AORTIC VALVE REPLACEMENT.

    Get PDF
    OBJECTIVES: Aortic valve replacement (AVR) leads to remodelling of the left ventricle (LV). Adopting a novel technique to examine dynamic LV function, our study explored whether post-AVR changes in dynamic LV function and/or changes in aortic valve characteristics are associated with LV mass regression during follow-up. METHODS AND RESULTS: We retrospectively analysed 30 participants with severe aortic stenosis who underwent standard transthoracic echocardiographic assessment prior to AVR (88[22-143] days), post-AVR (13[6-22] days) and during follow-up (455[226-907] days). We assessed standard measures of LV structure, function and aortic valve characteristics. Novel insight into dynamic LV function was provided through a 4-chamber image by examination of the temporal relation between LV longitudinal strain (Ô‘) and volume (Ô‘-volume loops), representing the contribution of LV mechanics to volume change. AVR resulted in immediate changes in structural valve characteristics, alongside a reduced LV longitudinal peak Ô‘ and improved coherence between the diastolic and systolic part of the Ô‘-volume loop (all P0.05). CONCLUSIONS: We found that post-AVR improvements in dynamic LV function, are related to long-term remodelling of the left ventricle. This highlights the potential importance of assessing dynamic LV function for cardiac adaptations in vivo

    Human Gyrovirus Apoptin shows a similar subcellular distribution pattern and apoptosis induction as the chicken anaemia virus derived VP3/Apoptin

    Get PDF
    The chicken anaemia virus-derived protein Apoptin/VP3 (CAV-Apoptin) has the important ability to induce tumour-selective apoptosis in a variety of human cancer cells. Recently the first human Gyrovirus (HGyV) was isolated from a human skin swab. It shows significant structural and organisational resemblance to CAV and encodes a homologue of CAV-Apoptin/VP3. Using overlapping primers we constructed a synthetic human Gyrovirus Apoptin (HGyV-Apoptin) fused to green fluorescent protein in order to compare its apoptotic function in various human cancer cell lines to CAV-Apoptin. HGyV-Apoptin displayed a similar subcellular expression pattern as observed for CAV-Apoptin, marked by translocation to the nucleus of cancer cells, although it is predominantly located in the cytosol of normal human cells. Furthermore, expression of either HGyV-Apoptin or CAV-Apoptin in several cancer cell lines triggered apoptosis at comparable levels. These findings indicate a potential anti-cancer role for HGyV-Apoptin

    On the cost of computing isogenies between supersingular elliptic curves

    Get PDF
    The security of the Jao-De Feo Supersingular Isogeny Diffie-Hellman (SIDH) key agreement scheme is based on the intractability of the Computational Supersingular Isogeny (CSSI) problem --- computing Fp2{\mathbb F}_{p^2}-rational isogenies of degrees 2e2^e and 3e3^e between certain supersingular elliptic curves defined over Fp2{\mathbb F}_{p^2}. The classical meet-in-the-middle attack on CSSI has an expected running time of O(p1/4)O(p^{1/4}), but also has O(p1/4)O(p^{1/4}) storage requirements. In this paper, we demonstrate that the van Oorschot-Wiener collision finding algorithm has a lower cost (but higher running time) for solving CSSI, and thus should be used instead of the meet-in-the-middle attack to assess the security of SIDH against classical attacks. The smaller parameter pp brings significantly improved performance for SIDH
    • …
    corecore