1,777 research outputs found

    Void growth in high strength aluminium alloy single crystals : a CPFEM based study

    Get PDF
    The author thankfully acknowledges the financial support of EPSRC funding (EP/L021714/1).Peer reviewedPostprin

    Secure spontaneous emergency access to personal health record

    Get PDF
    We propose a system which enables access to the user's Personal Health Record (PHR) in the event of emergency. The access typically occurs in an ad-hoc and spontaneous manner and the user is usually unconscious, hence rendering the unavailability of the user's password to access the PHR. The proposed system includes a smart card carried by the user at all time and it is personalized with a pseudo secret, an URL to the PHR Server, a secret key shared with the PHR Server and a number of redemption tokens generated using a hash chain. In each emergency session, a one-time use redemption token is issued by the smart card, allowing the emergency doctor to retrieve the user's PHR upon successful authentication of his credentials and validation of the redemption token. The server returns the PHR encrypted with a one-time session key which can only be decrypted by the emergency doctor. The devised interaction protocol to facilitate emergency access to the user's PHR is secure and efficient

    Pengaruh Bimbingan Manajemen Diri dalam Meningkatkan Kedisiplinan Belajar Siswa

    Get PDF
    The study was helt in atirah I senior high school grade XI at Makassar city the purpose is to know (1) the process and results of implementation of self management guidance in improving learning discipline experimental group students of. (2) the level of learnig discipline to learn the experimental group before and after the self-management guidance services. (3) the level of learning discipline of the control group before and after teach by giving information about the desciplane. (4) whether there are differences between the application of self-management guidance and information services in improving the efficientcy of learn discipline. This research uses and experimental approach (True Experimental Designs) in the form of pretest-posttest control group design. This study used data collection techniques by questionnaires, observation and evaluation of the understanding. Data analysis using descriptive statistical analysis of Wilcoxon signed ranks test. The results of this study indicate (1) The process of experimentel was running well. (2) level of discipline studying students before the experimental group was given self-management guidance services that are in the low category, while the level of discipline to learn the experimental group of students after being given self-management guidance services are in high category. (3) The level of discipline to learn the control group before and after teacing through information services remain at a low category, (4) there is a difference in learning discipline of experiental group student which giving self management guidance, and control groub students which giving information service

    Hierarchical attribute-based encryption and decryption

    Get PDF
    A domain authority 13 for use in a hierarchy of domain authorities in a hierarchical cryptographic system. The domain authority 13 comprises a user secret key generator 21 for generating a user secret key based on a domain secret key and one or more attribute representations, to obtain a user secret key associated with a set of attributes corresponding to the attribute representations, and wherein the domain secret key is based on a domain secret key of a parent domain authority or a root secret key of a root authority of the hierarchy of domain authorities, and wherein the attribute representations are independent of the hierarchy.A decrypter makes use of the user secret key. An encrypter generates ciphertext decryptable by the decrypter
    • …
    corecore