48 research outputs found

    A totally Self-Checking Dynamic Asynchronous Datapath

    Get PDF
    This paper investigates the inherent totally self-checking (TSC) property of one type of dynamic asynchronous datapath based on Differential Cascode Voltage Logic (DCVSL). As a result, a totally self-checking dynamic asynchronous datapath architecture is proposed. It is simpler than other similar approaches and represents a new approach to fault tolerant design.published_or_final_versio

    Review of The Electronic Transaction Ordinance: Can The Personal Identification Number Replace The Digital Signature?

    Get PDF
    In a recent consultation document, the Information Technology and Broadcasting Bureau proposed that personal identification numbers (PINs) be accepted as a form of signature for the purposes of the Electronic Transactions Ordinance (ETO) (Cap 553). This article explains why this proposal is fundamentally flawed. The article identifies three basic requirements for a signature and examines whether they are satisfied by digital signatures and PINs. It concludes that while a digital signature has built into it all the elements necessary for compliance with the requirements, a PIN can only be used for the purpose of authorisation and cannot be elevated to the status of a signature as required by the ETO.published_or_final_versio

    Digital evidence search kit

    Get PDF
    With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that can assist law enforcement agencies in cyber crime evidence collection. This paper describes a cyber crime evidence collection tool called DESK (Digital Evidence Search Kit), which is the product of several years of cumulative efforts of our Center together with the Hong Kong Police Force and several other law enforcement agencies of the Hong Kong Special Administrative Region. We will use DESK to illustrate some of the desirable features of an effective cyber crime evidence collection tool. © 2005 IEEE.published_or_final_versio

    Design for self-checking and self-timed datapath

    Get PDF
    This work examines the inherent self-checking property of a latch-free dynamic asynchronous datapath (LFDAD) using differential cascode voltage switch logic (DCVSL). Consequently, a highly efficient self-checking (SC) dynamic asynchronous datapath architecture is presented. In this architecture, no hardware needs to be added to the datapath to achieve self-checking. The presented implementation is efficient in terms of speed and area and represents a new approach to fault-tolerant design.published_or_final_versio

    Separable and anonymous identity-based key issuing

    Get PDF
    In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a secure channel is required. For privacy-oriented applications, it is important to keep in secret whether the private key corresponding to a certain identity has been requested. All of the existing ID-based key issuing schemes have not addressed this anonymity issue. Besides, the separation of duties of LRA and KGC has not been discussed as well. We propose a novel separable and anonymous ID-based key issuing scheme without secure channel. Our protocol supports the separation of duties between LRA and KGC. The private key computed by the KGC can be sent to the user in an encrypted form such that only the legitimate key requester authenticated by LRA can decrypt it, and any eavesdropper cannot know the identity corresponding to the secret key. © 2005 IEEE.published_or_final_versio

    Intrusion detection routers: Design, implementation and evaluation using an experimental testbed

    Get PDF
    In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed. The system, known as intrusion detection router (IDR), is deployed on network routers to perform online detection on any DDoS attack event, and then react with defense mechanisms to mitigate the attack. The testbed is built up by a cluster of sufficient number of Linux machines to mimic a portion of the Internet. Using the testbed, we conduct real experiments to evaluate the IDR system and demonstrate that IDR is effective in protecting the network from various DDoS attacks. © 2006 IEEE.published_or_final_versio

    The Whereabouts of 2D Gels in Quantitative Proteomics

    Get PDF
    Two-dimensional gel electrophoresis has been instrumental in the development of proteomics. Although it is no longer the exclusive scheme used for proteomics, its unique features make it a still highly valuable tool, especially when multiple quantitative comparisons of samples must be made, and even for large samples series. However, quantitative proteomics using 2D gels is critically dependent on the performances of the protein detection methods used after the electrophoretic separations. This chapter therefore examines critically the various detection methods (radioactivity, dyes, fluorescence, and silver) as well as the data analysis issues that must be taken into account when quantitative comparative analysis of 2D gels is performed

    Acute Dengue Infection in the Western Terai Region of Nepal

    No full text
    Introduction: Dengue fever is an emerging mosquito borne disease in Nepal claiming substantial morbidity and mortality. The objective of the study was to fi nd out frequency of acute dengue infection in patients from the hospitals of the western Nepal. Methods: The study was conducted between August 2007 and July 2008 in patients visiting hospitals of the western terai of Nepal with chief complains of fever. The sero-diagnosis of acute dengue infection was determined by enzyme linked immunosorbent assay among 239 patients visiting Lumbini Zonal Hospital, Butwal; Bheri Zonal Hospital, Nepalgunj; Bardiya District Hospital, Bardiya and Mahakali Zonal Hospital, Mahendranagar. Results: The anti-dengue IgM positivity was 29.3 %. There was slight male preponderance with a male to female ratio of 1.2:1. Out of the total positive cases, the highest positive cases (75.7 %) were from the age group 15 - 50 years followed by < 15 years old (15.7 %). Out of four hospitals, the highest positive cases (54.3 %) were in Lumbini Zonal Hospital, Butwal. The age and gender were independent predictors to dengue virus infection. The highest numbers of dengue positive cases were in October (52.6 %). The association between dengue disease and the month was statistically significant. Conclusions: The dengue positivity was estimated in acute patients from hospitals of western Nepal by enzyme immunoassay. Therefore, the serological marker can be used to diagnose acute patients of dengue during outbreaks.  Keywords: dengue, ELISA, post monsoon, sero-diagnosi
    corecore