1,050 research outputs found

    Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.Remote data integrity checking (RDIC) enables a data storage server, such as a cloud server, to prove to a verifier that it is actually storing a data owner’s data honestly. To date, a number of RDIC protocols have been proposed in the literature, but almost all the constructions suffer from the issue of a complex key management, that is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system complexity and the cost for establishing and managing the public key authentication framework in PKI based RDIC schemes. We formalize ID-based RDIC and its security model including security against a malicious cloud server and zero knowledge privacy against a third party verifier. We then provide a concrete construction of ID-based RDIC scheme which leaks no information of the stored files to the verifier during the RDIC process. The new construction is proven secure against the malicious server in the generic group model and achieves zero knowledge privacy against a verifier. Extensive security analysis and implementation results demonstrate that the proposed new protocol is provably secure and practical in the real-world applications.This work is supported by the National Natural Science Foundation of China (61501333,61300213,61272436,61472083), Fok Ying Tung Education Foundation (141065), Program for New Century Excellent Talents in Fujian University (JA1406

    An energy efficient interference-aware routing protocol for underwater WSNs

    Get PDF
    Interference-aware routing protocol design for underwater wireless sensor networks (UWSNs) is one of the key strategies in reducing packet loss in the highly hostile underwater environment. The reduced interference causes efficient utilization of the limited battery power of the sensor nodes that, in consequence, prolongs the entire network lifetime. In this paper, we propose an energy-efficient interference-aware routing (EEIAR) protocol for UWSNs. A sender node selects the best relay node in its neighborhood with the lowest depth and the least number of neighbors. Combination of the two routing metrics ensures that data packets are forwarded along the least interference paths to reach the final destination. The proposed work is unique in that it does not require the full dimensional localization information of sensor nodes and the network total depth is segmented to identify source, relay and neighbor nodes. Simulation results reveal better performance of the scheme than the counterparts DBR and EEDBR techniques in terms of energy efficiency, packet delivery ratio and end-to-end delay

    Anonymous Single-Sign-On for n designated services with traceability

    Get PDF
    Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations. In this paper we describe a new approach whereby anonymous authentication to different verifiers is achieved via authorisation tags and pseudonyms. The particular innovation of our scheme is authentication can only occur between a user and its designated verifier for a service, and the verification cannot be performed by any other verifier. The benefit of this authentication approach is that it prevents information leakage of a user's service access information, even if the verifiers for these services collude which each other. Our scheme also supports a trusted third party who is authorised to de-anonymise the user and reveal her whole services access information if required. Furthermore, our scheme is lightweight because it does not rely on attribute or policy-based signature schemes to enable access to multiple services. The scheme's security model is given together with a security proof, an implementation and a performance evaluation.Comment: 3

    99mTc-IgG-Lung Scintigraphy in the Assessment of Pulmonary Involvement in Interstitial Lung Disease and Its Comparison With Pulmonary Function Tests and High-Resolution Computed Tomography: A Preliminary Study

    Get PDF
    Background: The discrimination of inactive inflammatory processes from the active form of the disease is of great importance in the management of interstitial lung disease (ILD). Objectives: The aim of this study was to determine the efficacy of 99mTc-IgG scan for the detection of severity of disease compared to high-resolution computed tomography (HRCT) and pulmonary function test (PFT). Patients and Methods: Eight known cases of ILD including four cases of Mustard gas (MG) intoxication and four patients with ILD of unknown cause were included in this study. A population of six patients without lung disease was considered as the control group. The patients underwent PFT and high-resolution computed tomography scan, followed by 99mTc-IgG scan. They were followed up for one year. 99mTc-IgG scan assessment of IgG uptake was accomplished both qualitatively (subjectively) and semiquantitatively. Results: All eight ILD patients demonstrated a strong increase in 99mTc-IgG uptake in the lungs, compared to the control patients. The 99mTc-IgG scan scores were higher in the patient group (0.64[95% confidence interval (CI)=0.61-0.69])) than the control group (0.35 (0.35[95% CI=0.28-0.40]), (P 0.05). There were no significant correlations between 99mTc-IgG score and HRCT patterns including ground glass opacity, reticular fibrosis and honeycombing (P value > 0.05). Conclusion: The present results confirmed that 99mTc-IgG scan could be applied to detect the severity of pulmonary involvement, which was well correlated with HRCT findings. This data also showed that the 99mTc-IgG scan might be used as a complement to HRCT in the functional evaluation of the clinical status in ILD; however, further studies are recommended

    Condensation in hybrid superconducting-cavity–microscopic-spins systems with finite-bandwidth drive

    Get PDF
    Using Keldysh field theory, we find conditions for nonequilibrium condensation in the open Tavis-Cummings model under a direct finite-bandwidth incoherent cavity drive. Experimentally, we expect the condensation transition to be easily accessible to hybrid superconducting systems coupled to microscopic spins, as well as to many other incoherently driven light-matter systems. In our theoretical analysis, we explicitly incorporate the drive's spectral distribution into the saddle-point description. We show that the injected incoherent photons create a drive-dependent effective coupling between spin-1/2 particles. The condensation transition arises at a critical regime of driving which we can now accurately predict. Our results also provide important guidelines for future quantum simulation experiments of nonequilibrium phases with hybrid devices

    Digital habits and use of the internet as source of sexual and reproductive health information among undergraduates in northern Nigeria

    Get PDF
    Background: Surfing the internet and networking via social media have evolved at a startling pace. Objectives: To determine internet and social media habits and identify predictors of their use as sexual and reproductive health resource among Bayero University students. Study Design: A cross section of 385 students was interviewed using pre-tested anonymous structured self-completed questionnaires. Results: Nearly all students 98.4% (n=377) had accessed the internet and most 96.3% (n=363) had visited social media sites. Face book 57.3% (n=208), Twitter 22.3% (n=81) and Blackberry Messenger 8.8% (n=32) were the most popular among students. Of those with internet access,51.2%,46.2%, 39.2% and 38.5% mainly searched for information on HIV/AIDS, STI, sexual activities and menstrual problems respectively. There was more than two-fold likelihood of accessing online sexual information among female students compared to males, adjusted Odds ratio (aOR=2.52); 95% Confidence Interval (95%CI= 2.41-4.86). Similarly, ever-married students had more than twice the chance relative to single students (aOR=2.2, 95%CI=1.17-4.28). Furthermore, younger students (<20 years) were twice more likely to have used online resources compared to their older colleagues (≥30 years) (aOR=2.12, 95%CI=1.32-4.17). Conclusion: Undergraduate students are increasingly turning to the internet for sexual and reproductive health information. This presents an opportunity for programming.Key words: Internet, Social media, Reproductive, Sexual health, information source

    Asteroseismology

    Full text link
    Asteroseismology is the determination of the interior structures of stars by using their oscillations as seismic waves. Simple explanations of the astrophysical background and some basic theoretical considerations needed in this rapidly evolving field are followed by introductions to the most important concepts and methods on the basis of example. Previous and potential applications of asteroseismology are reviewed and future trends are attempted to be foreseen.Comment: 38 pages, 13 figures, to appear in: "Planets, Stars and Stellar Systems", eds. T. D. Oswalt et al., Springer Verla

    Evolutionary and pulsational properties of white dwarf stars

    Get PDF
    Abridged. White dwarf stars are the final evolutionary stage of the vast majority of stars, including our Sun. The study of white dwarfs has potential applications to different fields of astrophysics. In particular, they can be used as independent reliable cosmic clocks, and can also provide valuable information about the fundamental parameters of a wide variety of stellar populations, like our Galaxy and open and globular clusters. In addition, the high densities and temperatures characterizing white dwarfs allow to use these stars as cosmic laboratories for studying physical processes under extreme conditions that cannot be achieved in terrestrial laboratories. They can be used to constrain fundamental properties of elementary particles such as axions and neutrinos, and to study problems related to the variation of fundamental constants. In this work, we review the essentials of the physics of white dwarf stars. Special emphasis is placed on the physical processes that lead to the formation of white dwarfs as well as on the different energy sources and processes responsible for chemical abundance changes that occur along their evolution. Moreover, in the course of their lives, white dwarfs cross different pulsational instability strips. The existence of these instability strips provides astronomers with an unique opportunity to peer into their internal structure that would otherwise remain hidden from observers. We will show that this allows to measure with unprecedented precision the stellar masses and to infer their envelope thicknesses, to probe the core chemical stratification, and to detect rotation rates and magnetic fields. Consequently, in this work, we also review the pulsational properties of white dwarfs and the most recent applications of white dwarf asteroseismology.Comment: 85 pages, 28 figures. To be published in The Astronomy and Astrophysics Revie

    Methods to study splicing from high-throughput RNA Sequencing data

    Full text link
    The development of novel high-throughput sequencing (HTS) methods for RNA (RNA-Seq) has provided a very powerful mean to study splicing under multiple conditions at unprecedented depth. However, the complexity of the information to be analyzed has turned this into a challenging task. In the last few years, a plethora of tools have been developed, allowing researchers to process RNA-Seq data to study the expression of isoforms and splicing events, and their relative changes under different conditions. We provide an overview of the methods available to study splicing from short RNA-Seq data. We group the methods according to the different questions they address: 1) Assignment of the sequencing reads to their likely gene of origin. This is addressed by methods that map reads to the genome and/or to the available gene annotations. 2) Recovering the sequence of splicing events and isoforms. This is addressed by transcript reconstruction and de novo assembly methods. 3) Quantification of events and isoforms. Either after reconstructing transcripts or using an annotation, many methods estimate the expression level or the relative usage of isoforms and/or events. 4) Providing an isoform or event view of differential splicing or expression. These include methods that compare relative event/isoform abundance or isoform expression across two or more conditions. 5) Visualizing splicing regulation. Various tools facilitate the visualization of the RNA-Seq data in the context of alternative splicing. In this review, we do not describe the specific mathematical models behind each method. Our aim is rather to provide an overview that could serve as an entry point for users who need to decide on a suitable tool for a specific analysis. We also attempt to propose a classification of the tools according to the operations they do, to facilitate the comparison and choice of methods.Comment: 31 pages, 1 figure, 9 tables. Small corrections adde

    Platform-independent Secure Blockchain-Based Voting System

    Get PDF
    Cryptographic techniques are employed to ensure the security of voting systems in order to increase its wide adoption. However, in such electronic voting systems, the public bulletin board that is hosted by the third party for publishing and auditing the voting results should be trusted by all participants. Recently a number of blockchain-based solutions have been proposed to address this issue. However, these systems are impractical to use due to the limitations on the voter and candidate numbers supported, and their security framework, which highly depends on the underlying blockchain protocol and suffers from potential attacks (e.g., force-abstention attacks). To deal with two aforementioned issues, we propose a practical platform-independent secure and verifiable voting system that can be deployed on any blockchain that supports an execution of a smart contract. Verifiability is inherently provided by the underlying blockchain platform, whereas cryptographic techniques like Paillier encryption, proof-of-knowledge, and linkable ring signature are employed to provide a framework for system security and user-privacy that are independent from the security and privacy features of the blockchain platform. We analyse the correctness and coercion-resistance of our proposed voting system. We employ Hyperledger Fabric to deploy our voting system and analyse the performance of our deployed scheme numerically
    corecore