27 research outputs found

    Health and Human Rights Education in U.S. Schools of Medicine and Public Health: Current Status and Future Challenges

    Get PDF
    BACKGROUND: Despite increasing recognition of the importance of human rights in the protection and promotion of health, formal human rights education has been lacking in schools of medicine and public health. Our objectives were: 1) to determine the nature and extent of health and human rights (HHR) education among schools of medicine (SOMs) and public health (SPHs); 2) to identify perceived barriers to implementing HHR curricula; 3) to learn about deans' interests and attitudes toward HHR education, and; 4) to identify factors associated with offering HHR education. METHODS AND PRINCIPAL FINDINGS: We conducted a cross-sectional survey among deans of all accredited allopathic SOMs and SPHs in the United States and Puerto Rico. Seventy-one percent of U.S. SOMs and SPHs responded. Thirty-seven percent of respondents indicated that their schools offered some form of HHR education. Main barriers to offering HHR education included competition for time, lack of qualified instructors and lack of funding. Among schools not offering HHR education, 35% of deans were interested in offering HHR education. Seventy-six percent of all deans believed that it was very important or important to offer HHR education. Multiple regression analysis revealed that deans' attitudes were the most important factor associated with offering any HHR education. CONCLUSION: Findings indicate that though a majority of deans of SOMs and SPHs believe that knowledge about human rights is important in health practice and support the inclusion of HHR studies in their schools, HHR education is lacking at most of their institutions. These results and the growing recognition of the critical interdependence between health and human rights indicate a need for SOMs and SPHs to work towards formal inclusion of HHR studies in their curricula, and that HHR competency requirements be considered to overcome barriers to its inclusion

    Integrating Entrepreneurship into the Design Classroom: Case Studies from the Developing World

    Get PDF
    © 2017, Springer Science+Business Media, LLC. Developing countries are more and more committed to building a knowledge-based economy as a means to diversify from their current resource-based economy. The current focus of many governments is on technology with real insights on creative economy and arts. In this context, universities are seen as a key partner of the government. This article presents the results of two innovative case studies of professors working in the College of Art and Design collaborating with a professor in the College of Business to integrate the concepts of entrepreneurship into their interior design courses. This was done through designing space for entrepreneurial projects and by the students acting as entrepreneurs themselves with an external client. This dual model of training combines (1) learning processes about the habits and the needs of entrepreneurs and (2) learning by acting as an entrepreneur. Such methods demonstrate the role of universities to provide a proper theoretical background for students and to foster entrepreneurial behaviors through arts entrepreneurship education. Furthermore, the central role of professors to introduce innovative teaching methods to combine entrepreneurship and the creative economy into non-business courses is an important finding in these case studies

    Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound

    Get PDF
    The combination of universal hashing and encryption is a fundamental paradigm for the construction of symmetric-key MACs, dating back to the seminal works by Wegman and Carter, Shoup, and Bernstein. While fully sufficient for many practical applications, the Wegman-Carter construction, however, is well-known to break if nonces are ever repeated, and provides only birthday-bound security if instantiated with a permutation. Those limitations inspired the community to several recent proposals that addressed them, initiated by Cogliati et al.\u27s Encrypted Wegman-Carter Davies-Meyer (EWCDM) construction. This work extends this line of research by studying two constructions based on the sum of PRPs: (1) a stateless deterministic scheme that uses two hash functions, and (2) a nonce-based scheme with one hash-function call and a nonce. We show up to 2n/3-bit security for both of them if the hash function is universal. Compared to the EWCDM construction, our proposals avoid the fact that a single reuse of a nonce can lead to a break

    Commutativity, Associativity, and Public Key Cryptography

    No full text

    Zero knowledge with Rubik's cubes and non-abelian groups

    No full text
    International audienceThe factorization problem in non-abelian groups is still an open and a difficult problem [12]. The hardness of the problem is illustrated by the moves of the Rubik's cube.We will define a public key identification scheme based on this problem, in the case of the Rubik's cube, when the number of moves is fixed to a given value. Our scheme consists of an interactive protocol which is zero-knowledge argument of knowledge under the assumption of the existence of a commitment scheme. We will see that our scheme works with any non-abelian groups with a set of authorized moves that has a specific property. Then we will generalize the scheme for larger Rubik's cubes and for any groups. © Springer International Publishing 2013

    Feistel ciphers Security proofs and cryptanalysis

    No full text
    International audienceThis book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on indifferentiability and indistinguishability © Springer International Publishing AG 2017

    Fecal microbial therapy: promises and pitfalls.

    No full text
    A rapidly expanding range of diverse human diseases is now associated with perturbations to the gastrointestinal microbiome. Fecal microbial transplant (FMT) has been used with high rates of efficacy to treat gastrointestinal microbiome perturbation associated with recurrent Clostridium difficile infection, and is now being considered for other indications. Here we discuss the gut microbiome, review published and ongoing studies using FMT as a treatment modality for human disease, consider the regulatory aspects of FMT, and outline some factors that should be considered in patients in whom this therapeutic strategy is being contemplated

    Dynamic programming and the graphical traveling salesman problem

    No full text

    The Relation Between CENC and NEMO

    No full text
    Item does not contain fulltextCryptology and Network Security: 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 201
    corecore