39 research outputs found

    Symbolic Analysis of Identity-Based Protocols

    Get PDF
    International audienceWe show how the Tamarin tool can be used to model and reason about security protocols using identity-based cryptography, including identity-based encryption and signatures. Although such protocols involve rather different primitives than conventional public-key cryptography , we illustrate how suitable abstractions and Tamarin's support for equational theories can be used to model and analyze realistic industry protocols, either finding flaws or gaining confidence in their security with respect to different classes of adversaries. Technically, we propose two models of identity-based cryptography. First, we formalize an abstract model, based on simple equations, in which verification of realistic protocols is feasible. Second, we formalize a more precise model, leveraging Tamarin's support for bilinear pairing and exclusive-or. This model is much closer to practical realizations of identity-based cryptography, but deduction is substantially more complex. Along the way, we point out the limits of precise modeling and highlight challenges in providing support for equational reasoning. We evaluate our models on an industrial protocol case study, where we find and fix flaws

    Daily calcium intake in male children and adolescents obtained from the rapid assessment method and the 24-hour recall method

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>In order to rapidly assess nutrient intake, Food Frequency Questionnaires (FFQ) have been developed and proven to be reliable for quick, user friendly analysis in adults. However, the accuracy of these questionnaires in children has been studied to a limited extent. The aim of this study was to compare the daily calcium intake values obtained from the Rapid Assessment Method (RAM), an FFQ, for assessing daily calcium intake in child and adolescent males with the values obtained from the 24-hour recall method.</p> <p>Methods</p> <p>Subjects included 162 child and adolescent males, aged 9–16 years, subdivided into elementary school (ES, 9–12 years) and high school (HS, 14–16 years) age groups.</p> <p>Results</p> <p>Daily calcium intake was significantly lower in ES compared with HS, using both methods. The intra-class correlation coefficients (ICC) between RAM values and those obtained using the 24-hour recall questionnaire were significant yet moderate (ICC = 0.46 and 0.43 for ES and HS, respectively). However, daily calcium intake obtained using RAM was significantly higher when compared with the 24-hour recall values in both ES (1576 +/- 1101 vs. 1003 +/- 543 mg, in RAM and 24-hour, respectively) and in HS males (1873 +/- 739 vs. 1159 +/- 515 mg, in RAM and 24-hour, respectively).</p> <p>Conclusion</p> <p>RAM overestimates daily calcium intake as compared with the 24-hour recall method in both child and adolescent males.</p

    Lipoteichoic Acid Induces Unique Inflammatory Responses when Compared to Other Toll-Like Receptor 2 Ligands

    Get PDF
    Toll-like receptors (TLRs) recognize evolutionarily-conserved molecular patterns originating from invading microbes. In this study, we were interested in determining if microbial ligands, which use distinct TLR2-containing receptor complexes, represent unique signals to the cell and can thereby stimulate unique cellular responses. Using the TLR2 ligands, R-FSL1, S-FSL1, Pam2CSK4, Pam3CSK4, and lipoteichoic acid (LTA), we demonstrate that these ligands activate NF-κB and MAP Kinase pathways with ligand-specific differential kinetics in murine macrophages. Most strikingly, LTA stimulation of these pathways was substantially delayed when compared with the other TLR2 ligands. These kinetics differences were associated with a delay in the LTA-induced expression of a subset of genes as compared with another TLR2 ligand, R-FSL1. However, this did not translate to overall differences in gene expression patterns four hours following stimulation with different TLR2 ligands. We extended this study to evaluate the in vivo responses to distinct TLR2 ligands using a murine model of acute inflammation, which employs intravital microscopy to monitor leukocyte recruitment into the cremaster muscle. We found that, although R-FSL1, S-FSL1, Pam2CSK4, and Pam3CSK4 were all able to stimulate robust leukocyte recruitment in vivo, LTA remained functionally inert in this in vivo model. Therefore distinct TLR2 ligands elicit unique cellular responses, as evidenced by differences in the kinetic profiles of signaling and gene expression responses in vitro, as well as the physiologically relevant differences in the in vivo responses to these ligands

    In Bonobos Yawn Contagion Is Higher among Kin and Friends

    Get PDF
    In humans, the distribution of yawn contagion is shaped by social closeness with strongly bonded pairs showing higher levels of contagion than weakly bonded pairs. This ethological finding led the authors to hypothesize that the phenomenon of yawn contagion may be the result of certain empathic abilities, although in their most basal form. Here, for the first time, we show the capacity of bonobos (Pan paniscus) to respond to yawns of conspecifics. Bonobos spontaneously yawned more frequently during resting/relaxing compared to social tension periods. The results show that yawn contagion was context independent suggesting that the probability of yawning after observing others\u27 yawns is not affected by the propensity to engage in spontaneous yawns. As it occurs in humans, in bonobos the yawing response mostly occurred within the first minute after the perception of the stimulus. Finally, via a Linear Mixed Model we tested the effect of different variables (e.g., sex, rank, relationship quality) on yawn contagion, which increased when subjects were strongly bonded and when the triggering subject was a female. The importance of social bonding in shaping yawn contagion in bonobos, as it occurs in humans, is consistent with the hypothesis that empathy may play a role in the modulation of this phenomenon in both species. The higher frequency of yawn contagion in presence of a female as a triggering subject supports the hypothesis that adult females not only represent the relational and decisional nucleus of the bonobo society, but also that they play a key role in affecting the emotional states of others

    Genetic Variation and Population Substructure in Outbred CD-1 Mice: Implications for Genome-Wide Association Studies

    Get PDF
    Outbred laboratory mouse populations are widely used in biomedical research. Since little is known about the degree of genetic variation present in these populations, they are not widely used for genetic studies. Commercially available outbred CD-1 mice are drawn from an extremely large breeding population that has accumulated many recombination events, which is desirable for genome-wide association studies. We therefore examined the degree of genome-wide variation within CD-1 mice to investigate their suitability for genetic studies. The CD-1 mouse genome displays patterns of linkage disequilibrium and heterogeneity similar to wild-caught mice. Population substructure and phenotypic differences were observed among CD-1 mice obtained from different breeding facilities. Differences in genetic variation among CD-1 mice from distinct facilities were similar to genetic differences detected between closely related human populations, consistent with a founder effect. This first large-scale genetic analysis of the outbred CD-1 mouse strain provides important considerations for the design and analysis of genetic studies in CD-1 mice

    Symbolic Encryption with Pseudorandom Keys

    Get PDF
    We give an efficient decision procedure that, on input two (acyclic) cryptographic expressions making arbitrary use of an encryption scheme and a (length doubling) pseudorandom generator, determines (in polynomial time) if the two expressions produce computationally indistinguishable distributions for any pseudorandom generator and encryption scheme satisfying the standard security notions of pseudorandomness and indistinguishability under chosen plaintext attack. The procedure works by mapping each expression to a symbolic pattern that captures, in a fully abstract way, the information revealed by the expression to a computationally bounded observer. We then prove that if any two (possibly cyclic) expressions are mapped to the same pattern, then the associated distributions are indistinguishable. At the same time, if the expressions are mapped to different symbolic patterns and do not contain encryption cycles, there are secure pseudorandom generators and encryption schemes for which the two distributions can be distinguished with overwhelming advantage

    Towards Network Denial Of Service Resistant Protocols

    No full text
    Networked and distributed systems have introduced a new significant threat to the availability of data and services: network denial of service attacks. A well known example is the TCP SYN ooding. In general, any statefull handshake protocol is vulnerable to similar attacks. This paper examines the network denial of service in detail and surveys and compares different approaches towards preventing the attacks. As a conclusion, a number of protocol design principles are identified essential in designing network denial of service resistant protocols, and examples provided on applying the principles

    A novel approach for prediction of vitamin D status using support vector regression

    Get PDF
    Background: Epidemiological evidence suggests that vitamin D deficiency is linked to various chronic diseases. However direct measurement of serum 25-hydroxyvitamin D (25(OH)D) concentration, the accepted biomarker of vitamin D status, may not be feasible in large epidemiological studies. An alternative approach is to estimate vitamin D status using a predictive model based on parameters derived from questionnaire data. In previous studies, models developed using Multiple Linear Regression (MLR) have explained a limited proportion of the variance and predicted values have correlated only modestly with measured values. Here, a new modelling approach, nonlinear radial basis function support vector regression (RBF SVR), was used in prediction of serum 25(OH)D concentration. Predicted scores were compared with those from a MLR model. Methods: Determinants of serum 25(OH)D in Caucasian adults (n = 494) that had been previously identified were modelled using MLR and RBF SVR to develop a 25(OH)D prediction score and then validated in an independent dataset. The correlation between actual and predicted serum 25(OH)D concentrations was analysed with a Pearson correlation coefficient. Results: Better correlation was observed between predicted scores and measured 25(OH)D concentrations using the RBF SVR model in comparison with MLR (Pearson correlation coefficient: 0.74 for RBF SVR; 0.51 for MLR). The RBF SVR model was more accurately able to identify individuals with lower 25(OH)D levels
    corecore