Spelling suggestions: "subject:"top"" "subject:"tot""
1 |
The Effects of Tri-O-Tolyl Phosphate (TOTP) on the Immune System of MiceBrinkerhoff, Craig R. 01 May 1980 (has links)
TOTP is a prevalent industrial and environmental contaminant which has been shown to be a neurotoxic agent. This study was undertaken to investigate the effects of this compound on the immune system. Several techniques were employed to test the humoral as well as cellular effects. Male Swiss Webster mice were administered by gastric gavage with three doses of TOTP (5, 50, and 500 mg/kg) and one dose TMTP (50 mg/kg) in corn oil once a week for 13 weeks. Control animals were given corn oil alone.
Lymphocyte transformation was determined on cultures of splenic cells obtained from animals sacrificed at 1, 4, 8, and 13 weeks. Relative Proliferation Index (RPI) and Stimulation Index (SI) was calculated for phytohemagglutinin (PHA), pokeweed (PWM), and lipopolysaccharide (LPS) mitogen treated cultures. Proliferation was measured by uptake of radioisotope labeled thymidine.
Plaque formation as well as delayed hypersensitivity was evaluated at all dose levels after 4 weeks of treatment. Humoral effects were determined utilizing quantitative (Rocket) immunoelectropheresis. Serum was compared with control serum for IgA, IgG, and IgM fractions.
TOTP was found to cause slight suppression in proliferation of splenic lymphocytes at 8 and 13 weeks although this suppression was non-specific and not dose related. No effects were seen on body and organ weights. Plaque forming cells and delayed hypersensitivity were not affected either by dose or time of treatment. Immunoglobulin fractions tested were similarly not affected by time or dosage. These findings suggest that neither TOTP nor TMTP exhibit immunotoxic effects at levels used.
|
2 |
Autentizace v informačních systémech / authentication for information systemJenčík, Štěpán January 2017 (has links)
This thesis is focused on authentication methods, for regular private users and company solutions. Based on the analysis of individual authentication methods discussed in a theoretical part, the most suitable solutions are chosen. The practical part then offers various solutions divided into categories based on the users profiles. This presented overview suggests possible follow up discussion topics and an outline of the future development in the area of authentication methods and tools.
|
3 |
En säker digital CV-hantering med TOTP- och HOTP-algoritmer : Jämförelse mellan TOTP- och HOTP-algoritmerMarzban, David January 2024 (has links)
Projektet syftade till att erhålla en djupgående förståelse för OTP-, TOTP- och HOTP-algoritmer samt deras tillämpningar inom säkerhet och integration, särskilt med avseende på digitala CV och PDF-filsäkerhet. För att uppnå detta genomfördes en noggrann undersökning av algoritmernas funktion och lämplighet för att säkerställa en robust säkerhetsinfrastruktur för digitala dokument. Metoden innefattade först en omfattande insamling av relevant information och teoretisk bakgrund för att etablera en grundläggande förståelse för ämnet. Därefter utvecklades en webbapplikation med Java, Java Create PDF med iText, JSF och JSP, som möjliggjorde skapandet av PDF-CV och testning av de olika algoritmerna. Implementeringen av algoritmerna på PDF-filen möjliggjorde en empirisk jämförelse av deras effektivitet och säkerhetsnivåer. Under projektets gång utvärderades både tekniska utmaningar och potentiella säkerhetsrisker. Arbetet krävde en noggrannhet och metodiskt tillvägagångssätt för att säkerställa att algoritmerna fungerade enligt förväntningarna och att integriteten hos den digitala informationen bevarades. Sammanfattningsvis har projektet bidragit till en fördjupad förståelse för OTP-, TOTP- och HOTP-algoritmer och deras tillämpningar inom digital säkerhet. TOTP-algoritmen generellt är mer säker på grund av sin tidsbaserade natur, medan HOTP-algoritmen kan vara fördelaktig i situationer där tidsynkronisering är utmanade. Dessa resultat visade att TOTP-algoritmen är mest lämplig för att välja för detta projekt och kan användas som grund för framtida utveckling av säkra digitala kommunikations- och dokumenthanteringsplattformar. / This project aimed to acquire a deep understanding of OTP, TOTP, and HOTP algorithms and their applications in security and integration, particularly concerning digital CVs and PDF file security. To achieve this, a thorough examination of the algorithms functionality and suitability for ensuring a robust security infrastructure for digital documents conducted. The methodology first involved comprehensive collection of relevant information and theoretical background to establish a foundational understanding of the subject. Subsequently, a web application developed using Java, Java Create PDF with iText, JSF, and JSP, enabling the creation of PDF CVs and testing of the different algorithms. The implementation of the algorithms on the PDF file facilitated an empirical comparison of their efficiency and security levels. Throughout the project, both technical challenges and potential security risks evaluated. The work required precision and a methodical approach to ensure that the algorithms functioned as expected and that the integrity of the digital information ware preserved. In summary, the project has contributed to a deeper understanding of OTP, TOTP, and HOTP algorithms and their applications in digital security. The TOTP algorithm is generally more secure due to its time-based nature, while the HOTP algorithm may be advantageous in situations where time synchronization is challenging. These results showed that the TOTP algorithm is the most suitable choice for this project and can serve as a basis for the future development of secure digital communication and document management platforms.
|
4 |
Usability Comparison between U2F-based Security Keys, TOTP and Plain Passwords : A Structured Literature ReviewIriarte Murgiondo, Asier January 2022 (has links)
Multi-factor authentication is a term that was foreign until a few years ago. But in reality, it has been around for decades in the world of computer security. In theory, has the purpose to improve the security of user authentication by adding an extra layer of security to the process. Although password authentication has been shown to be an imperfect technique, it is still the most widely used today. That is why this research has been carried out, to shed light on the issue of why multi-factor authentication is not a fundamental pillar in security. For this, two promising protocols of the second authentication factor have been chosen, Time-based One-time Password (TOTP) and Universal 2nd Factor (U2F), and the usability of these methods has been compared together with password authentication usability as well. A Systematic Literature Review has been executed to answer the raised research question. Although the setup and login processes of the protocols are excessively slow, the results show that the U2F devices are overall more usable than TOTP, as they have a more “friendly” daily usage. But not enough data has been found on TOTP to be able to make a comparison with a solid basis. / La autenticación de múltiples factores es un término que era extraño hasta hace varios años. Pero en realidad, ha existido durante décadas en el mundo de la seguridad informática. En teoría, su objetivo es mejorar la seguridad del proceso de autenticación de usuarios, agregando una capa adicional de seguridad al proceso. Aunque se ha demostrado que la autenticación de contraseña es una técnica imperfecta, sigue siendo la más utilizada en la actualidad. Esta es la razón por la que se ha realizado esta investigación, para arrojar luz sobre el tema de por qué la autenticación de múltiples factores no es un pilar fundamental en la seguridad. Para ello, se han elegido dos protocolos prometedores del segundo factor de autentificación, como son, Time-based One-time Password (TOTP) y Universal 2nd Factor (U2F), y se ha comparado la usabilidad de estos métodos junto con usabilidad de la autenticación por contraseña. Se ha realizado una Revisión Sistemática de la Literatura (Systematic Literature Review) para dar respuesta a la pregunta de investigación planteada. Aunque los procesos de configuración e inicio de sesión de los protocolos son excesivamente lentos, los resultados muestran que los dispositivos U2F son en general mas usables ya que tienen un uso diario más “amigable”. Pero no se han encontrado suficientes datos sobre TOTP para poder hacer una comparación con una sólida base. / <p><strong>Laburpena</strong> [Summary/Abstract, Basque/baskiska]</p><p>Faktore-anitzeko autentifikazioa orain dela urte gutxi arte arrotza izan den terminoetako bat da. Baina, egia esan, hamarkada batzuk daramatza segurtasun informatikoaren munduan errotua. Teorian, erabiltzaileen autentifikazio-prozesuaren segurtasuna hobetzeko helburu du, prozesuari segurtasun-geruza berri bat gehituz. Pasahitz autentifikazio teknika inperfektua dela frogatu bada ere, gaur egun oraindik erabiliena da. Horregatik egin da ikerketa hau, faktore anitzeko autentifikazioa zergatik ez den segurtasunaren oinarrizko zutabea argitzeko. Horretarako, faktore-anitzeko autentifikazio barruan aurkitzen diren bi protokolo itxaropentsu aukeratu dira, hala nola, Time-based One-time Password (TOTP) eta Universal 2nd Factor (U2F), eta hauen erabilgarritasuna konparatu da pasahitz bidezko erabilgarritasunarekin batera. Planteatutako ikerketa galderari erantzuteko Literatura Ikerketa Sistematikoa (Systematic Literature Review) burutu da, protokolo bakoitzaren onurak/eragozpenak bilduz eta hauen arteko konparaketa bat eginez. Protokoloen konfigurazio eta saioa hasteko prosezuak motelegiak badira ere, emaitzek erakusten dute U2F gailuak orokorreak TOTP baino erabilgarriagoak direla, eguneroko erabilera “lagunartekoagoa” baitute. Baina ez da datu nahikorik aurkitu TOTP-en oinarri sendo batekin konparazio bat egin ahal izateko.</p><p><strong>HITZ-GAKOAK:</strong> autentifikazioa, faktore-anitzeko autentifikazioa, Universal 2nd Factor, U2F, Time-based One-time Password, TOTP, alderaketa, erabilgarritasuna</p>
|
Page generated in 0.0353 seconds