85 research outputs found

    Attacking Cryptographic Schemes Based on Perturbation Polynomials

    Get PDF
    We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use perturbation polynomials to add noise to polynomial-based systems that offer information-theoretic security, in an attempt to increase the resilience threshold while maintaining efficiency. We show that the heuristic security arguments given for these modified schemes do not hold, and that they can be completely broken once we allow even a slight extension of the parameters beyond those achieved by the underlying information-theoretic schemes. Our attacks apply to the key predistribution scheme of Zhang et al. (MobiHoc~2007), the access-control schemes of Subramanian et al. (PerCom~2007), and the authentication schemes of Zhang et~al. (INFOCOM~2008)

    The Friend zone: An In/inite Place Where Nothing Good Happens: A Comprehensive Study of Friend zoning Across Varying Genders and Sexual Orientations

    Get PDF
    “Friend zone” is a popular culture term used to describe a friendship where one member in a friend dyad desires a romantic or sexual relationship and the other member does not. Sexual Script Theory (Simon & Gagnon, 2003) and Sexual Strategies Theory (Buss & Schmidt, 1993) suggest that individuals will typically view the friend zone as a Qield dominated by female-to-male interactions, given sexual scripts on women as gatekeepers and men as being more active in initiating relationships. It may be expected then that men and women and individuals who are not exclusively heterosexual may then follow different scripts for making and negotiating friend zone choices. There is very little data available concerning instances of the use of the term friend zone in same-sex friendship interactions. Individuals are typically expected to have relationships that conform to the heteronormative script, so most people are resistant to the thought of being attracted to others of the same sex (Lamb, 2004). Because of this, many “best friendships” between those of the same sex have been used as protection against claims of same-sex attraction/relationships (Lamb, 2004). Given the lack of research on same-sex friend zoning, as well as the restrictive nature of heteronormative scripts, the current study explores the practice of friend zoning within same-sex friendships.https://orb.binghamton.edu/research_days_posters/1003/thumbnail.jp

    Comparison of time course changes in blood glucose, insulin and lipids between high carbohydrate and high fat meals in healthy young women

    Get PDF
    Few studies have examined short term responses to the different contents of carbohydrate or fat in the meal, although long term effects of the high fat meal have been considered as compound risk factor for metabolic disorders. The aim of this study was to investigate the postprandial changes of plasma glucose, insulin and lipids upon intakes of high carbohydrate or high fat meal in young healthy women. Subjects were randomly assigned to either the high carbohydrate meal (HCM, 75% carbohydrate, n=13) or the high fat meal (HFM, 60% fat, n=12) groups. The meals were prepared as isocaloric typical Korean menu. Blood samples were obtained prior to and 30, 60, 90, 120, 180 and 240 minute after the meal. There were no significant differences on fasting blood parameters including glucose, insulin, lipids concentrations between the groups prior to the test. The HCM had higher blood glucose and insulin concentrations, reached the peak at 30 min and maintained for 240 min compared to the HFM (P<0.05). The HFM had higher plasma triglyceride (TG) and free fatty acid (FFA) concentrations, reached the peak at 120 min and maintained for 240 min compared to the HCM (P<0.05). It is concluded that macronutrients content in the meal may be an important determinant of postprandial substrate utilization in healthy women

    A Study of the Learnability of Relational Properties: Model Counting Meets Machine Learning (MCML)

    Full text link
    This paper introduces the MCML approach for empirically studying the learnability of relational properties that can be expressed in the well-known software design language Alloy. A key novelty of MCML is quantification of the performance of and semantic differences among trained machine learning (ML) models, specifically decision trees, with respect to entire (bounded) input spaces, and not just for given training and test datasets (as is the common practice). MCML reduces the quantification problems to the classic complexity theory problem of model counting, and employs state-of-the-art model counters. The results show that relatively simple ML models can achieve surprisingly high performance (accuracy and F1-score) when evaluated in the common setting of using training and test datasets - even when the training dataset is much smaller than the test dataset - indicating the seeming simplicity of learning relational properties. However, MCML metrics based on model counting show that the performance can degrade substantially when tested against the entire (bounded) input space, indicating the high complexity of precisely learning these properties, and the usefulness of model counting in quantifying the true performance

    Prevention of Overweight and Obesity: How Effective is the Current Public Health Approach

    Get PDF
    Obesity is a public health problem that has become epidemic worldwide. Substantial literature has emerged to show that overweight and obesity are major causes of co-morbidities, including type II diabetes, cardiovascular diseases, various cancers and other health problems, which can lead to further morbidity and mortality. The related health care costs are also substantial. Therefore, a public health approach to develop population-based strategies for the prevention of excess weight gain is of great importance. However, public health intervention programs have had limited success in tackling the rising prevalence of obesity. This paper reviews the definition of overweight and obesity and the variations with age and ethnicity; health consequences and factors contributing to the development of obesity; and critically reviews the effectiveness of current public health strategies for risk factor reduction and obesity prevention

    Comparison of body mass index with waist circumference and skinfold-based percent body fat in firefighters: adiposity classification and associations with cardiovascular disease risk factors

    Full text link
    PurposeThis study aims to examine whether body mass index (BMI) overestimates the prevalence of overweight or obese firefighters when compared to waist circumference (WC) and skinfold-based percent body fat (PBF) and to investigate differential relationships of the three adiposity measures with other biological cardiovascular disease (CVD) risk factors.MethodsThe adiposity of 355 (347 males and eight females) California firefighters was assessed using three different measures. Other CVD risk factors (high blood pressure, high lipid profiles, high glucose, and low VO2 max) of the firefighters were also clinically assessed.ResultsThe prevalence of total overweight and obesity was significantly (p &lt; 0.01) higher by BMI (80.4 %) than by WC (48.7 %) and by PBF (55.6 %) in male firefighters. In particular, the prevalence of overweight firefighters was much higher (p &lt; 0.01) by BMI (57.3 %) than by WC (24.5 %) and PBF (38.3 %). 60-64 % of male firefighters who were assessed as normal weight by WC and PBF were misclassified as overweight by BMI. When overweight by BMI was defined as 27.5-29.9 kg/m(2) (vs. the standard definition of 25.0-29.9 kg/m(2)), the agreement of the adiposity classification increased between BMI and other two adiposity measures. Obese firefighters had the highest CVD risk profiles across all three adiposity measures. Only when overweight by BMI was defined narrowly, overweight firefighters had substantially higher CVD risk profiles. Obesity and overweight were less prevalent in female and Asian male firefighters.ConclusionsBMI overestimated the prevalence of total overweight and obesity among male firefighters, compared to WC and skinfold-based PBF. Overweight by BMI needs to be more narrowly defined, or the prevalence of BMI-based overweight (27.5-29.9 kg/m(2)) should be reported additionally for prevention of CVD among male firefighters

    Adaptively-Secure, Non-Interactive Public-Key Encryption

    Get PDF
    Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret data of already-corrupted parties. Ideally, an adaptively-secure encryption scheme should, like standard public-key encryption, allow arbitrarily-many parties to use a single encryption key to securely encrypt arbitrarily-many messages to a given receiver who maintains only a single short decryption key. However, it is known that these requirements are impossible to achieve: no noninteractive encryption scheme that supports encryption of an unbounded number of messages and uses a single, unchanging decryption key can be adaptively secure. Impossibility holds even if secure data erasure is possible

    Abstract

    No full text
    Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret data of already-corrupted parties. Ideally, an adaptively-secure encryption scheme should, like standard public-key encryption, allow arbitrarily-many parties to use a single encryption key to securely encrypt arbitrarily-many messages to a given receiver who maintains only a single short decryption key. However, it is known that these requirements are impossible to achieve: no noninteractive encryption scheme that supports encryption of an unbounded number of messages and uses a single, unchanging decryption key can be adaptively secure. Impossibility holds even if secure data erasure is possible. We show that this limitation can be overcome by updating the decryption key over time and making some mild assumptions about the frequency of communication between parties. Using this approach, we construct adaptively-secure, completely non-interactive encryption schemes supporting secure encryption of arbitrarily-many messages from arbitrarily-many senders. Our schemes additionally provide forward security and security against chosen-ciphertext attacks. Key words: Public-key encryption, adaptive security, forward security, non-committing encryption
    • 

    corecore