908 research outputs found

    Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking

    Get PDF
    The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols

    Denial-of-Service Resistance in Key Establishment

    Get PDF
    Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive cryptographic operations in order to authenticate the protocol initiator and to generate the cryptographic keying material that will subsequently be used to secure the communications between initiator and responder. The goal of DoS resistance in key establishment protocols is to ensure that attackers cannot prevent a legitimate initiator and responder deriving cryptographic keys without expending resources beyond a responder-determined threshold. In this work we review the strategies and techniques used to improve resistance to DoS attacks. Three key establishment protocols implementing DoS resistance techniques are critically reviewed and the impact of misapplication of the techniques on DoS resistance is discussed. Recommendations on effectively applying resistance techniques to key establishment protocols are made

    A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract

    Get PDF
    Formal analysis and verification methods can aid the design and validation of security properties in blockchain based protocols. However, to generate a reasonable and correct verification, a proper model for the blockchain is needed. In this paper, we give a blockchain model in Tamarin. Based on our model we analyze and give a formal verification for the hash time lock contract, an atomic cross chain trading protocol. The result shows that our model is able to identify an underlying assumption for the hash time lock contract and that the model is useful for analyzing blockchain based protocols

    Health and Safety of Aircrew: A Critique of the National and International Debates

    Get PDF
    There are a number of current debates about the enforcement of occupational health and safety of aircrew and about their levels of injury and illness. The impetuses for these debates are the regulatory reforms of occupational health and safety taking place in both New Zealand and overseas. This paper aims to provide an informed response to this discourse on the health and safety of aircrew by drawing on a number of sources. The paper presents a critique of the legislation governing the health and safety of aircrew and of the industry's response to possible legislative reforms. The paper also analyses civil aviation safety practices both nationally and internationally, and will argue that civil aviation authorities are not necessarily the best agencies to enforce and promote occupational health and safety in the airline industry

    Evaluation of melanin-targeted radiotherapy in combination with radiosensitizing drugs for the treatment of melanoma

    Get PDF
    The incidence of malignant melanoma is rising faster than that of any other cancer in the United States. An [131I]-labeled benzamide - [131I]MIP-1145 - selectively targets melanin, reduces melanoma tumor burden and increases survival in preclinical models. Our purpose was to determine the potential of radiosensitizers to enhance the anti-tumor efficacy of [131I]MIP-1145. Melanotic (A2058) and amelanotic (A375 and SK-N-BE(2c)) cells were treated with [131I]MIP-1145 as a single agent or in combination with drugs with radiosenitizing potential. Cellular uptake of [131I]MIP-1145 and toxicity were assessed in monolayer culture. The interaction between radiosensitizers and [131I]MIP-1145 was evaluated by combination index analysis in monolayer cultures and by delayed growth of multicellular tumor spheroids. [131I]MIP-1145 was taken up by and was toxic to melanotic cells but not amelanotic cells. Combination treatments comprising [131I]MIP-1145 with the topoisomerase inhibitor topotecan or the PARP-1 inhibitor AG014699 resulted in synergistic clonogenic cell kill and enhanced delay of the growth of spheroids derived from melanotic melanoma cells. The proteasome inhibitor bortezomib had no synergistic cytotoxic effect with [131I]MIP-1145 and failed to enhance the delay of spheroid growth. Following combination treatment of amelanotic cells, neither synergistic clonogenic cell kill nor enhanced growth delay of spheroids was observed

    Digital image watermarking: its formal model, fundamental properties and possible attacks

    Get PDF
    While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes

    The role of copper in disulfiram-induced toxicity and radiosensitisation of cancer cells.

    Get PDF
    Abstract Disulfiram has been used for several decades in the treatment of alcoholism. It now shows promise as an anti-cancer drug and radiosensitizer. Proposed mechanisms of action include the induction of oxidative stress and inhibition of proteasome activity. Our purpose was to determine the potential of disulfiram to enhance the anti-tumor efficacy of external beam -irradiation and 131I-metaiodobenzylguanidine (131I-MIBG), a radiopharmaceutical used for the therapy of neuroendocrine tumors. Methods: The role of copper in disulfiram-induced toxicity was investigated by clonogenic assay after treatment of human SK-N-BE(2c) neuroblastoma and UVW/NAT glioma cells. Synergistic interaction between disulfiram and radiotherapy was evaluated by combination index analysis. Tumor growth delay was determined in vitro using multicellular tumor spheroids and in vivo using human tumor xenografts in athymic mice. Results: Escalating disulfiram dosage caused a biphasic reduction in the surviving fraction of clonogens. Clonogenic cell kill after treatment with disulfiram concentrations less than 4 M was copper-dependent, whereas cytotoxicity at concentrations greater than 10 M was caused by oxidative stress. The cytotoxic effect of disulfiram was maximal when administered with equimolar copper. Likewise, disulfiram’s radiosensitization of tumor cells was copper-dependent. Furthermore, disulfiram treatment enhanced the toxicity of 131I-MIBG to spheroids and xenografts expressing the noradrenaline transporter. Conclusions: The results demonstrate that (i) the cytotoxicity of disulfiram was copper-dependent; (ii) molar excess of disulfiram relative to copper resulted in attenuation of disulfiram-mediated cytotoxicity; (iii) copper was required for the radiosensitizing activity of disulfiram and (iv) copper-complexed disulfiram enhanced the efficacy not only of external beam radiation but also of targeted radionuclide therapy in the form of 131I-MIBG. Therefore disulfiram may have anti-cancer potential in combination with radiotherapy

    Building a risky-safe-space: Using reflective pedagogies and values to support writing development in work based learning

    Get PDF
    The concepts of ‘graduateness’ and graduate attributes became contested terrain before COVID-19 destabilised even the most assured of shared learning constructions. Indeed, for those of us immersed in the delivery of work-based learning (WBL), this has long been the case. Promotion of reductive notions of ‘skills’ acquisition to comply neatly with an employability agenda holds little relevance for those students already engaged in full time careers, and with a wealth of professional experience. What can hold influence and interest, however, is the opportunity to engage in meaningful, agentic, professionally-aligned reflective practices as a scaffolded route to promoting self-awareness and developing confidence in mapping competences from the professional domain to the academic (and vice versa). This paper shares an account of taking an embedded approach to supporting the development of academic literacies amongst work-based learners in one UK HEI. In particular, it will consider the use of reflective pedagogical tools and values in supporting work-based learners to become confident and adaptable writers. Discussion considers how work-based pedagogies and approaches may have far-reaching relevance in a post-pandemic landscape, where reskilling and professional agility are likely to become more prolific aspects of education and work. Writing itself is framed as an integrated communication practice that encompasses literature retrieval, reading, evaluation, synthesis and articulation of argument. The paper will describe pre-pandemic academic support activities and share qualitative survey data in which students consider their confidence as both professional and academic writers. It concludes with consideration of how some of the approaches outlined may have relevance for the wider academic community

    In Search of Homo Economicus: Behavioral Experiments in 15 Small-Scale Societies

    Get PDF
    We can summarize our results as follows. First, the canonical model is not supported in any society studied. Second, there is considerably more behavioral variability across groups than had been found in previous cross-cultural research, and the canonical model fails in a wider variety of ways than in previous experiments. Third, group-level differences in economic organization and the degree of market integration explain a substantial portion of the behavioral variation across societies: the higher the degree of market integration and the higher the payoffs to cooperation, the greater the level of cooperation in experimental games. Fourth, individual-level economic and demographic variables do not explain behavior either within or across groups. Fifth, behavior in the experiments is generally consistent with economic patterns of everyday life in these societies
    corecore