71,221 results
Search Results
2. Short Paper: Terrorist Fraud in Distance Bounding: Getting Around the Models
- Author
-
David Gerault
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Bounding overwatch ,Computer science ,Short paper ,Terrorism ,Rfid authentication ,Key (cryptography) ,ComputingMilieux_COMPUTERSANDSOCIETY ,Adversary ,Gas meter prover ,Computer security ,computer.software_genre ,computer - Abstract
Terrorist fraud is an attack against distance bounding protocols, whereby a malicious prover allows an adversary to authenticate on their behalf without revealing their secret key. In this paper, we propose new attack strategies that lead to successful terrorist frauds on proven-secure protocols.
- Published
- 2021
3. Security Memory System for Mobile Device or Computer Against Memory Attacks
- Author
-
Liu, Genxian, Zhang, Xi, Wang, Dongsheng, Liu, Zhenyu, Wang, Haixia, Yuan, Yuyu, editor, Wu, Xu, editor, and Lu, Yueming, editor
- Published
- 2014
- Full Text
- View/download PDF
4. Reconstruction of Konrad Zuse’s Z3
- Author
-
Zuse, Horst, Tatnall, Arthur, editor, Blyth, Tilly, editor, and Johnson, Roger, editor
- Published
- 2013
- Full Text
- View/download PDF
5. Exhibiting the Online World: A Case Study
- Author
-
Weber, Marc, Tatnall, Arthur, editor, Blyth, Tilly, editor, and Johnson, Roger, editor
- Published
- 2013
- Full Text
- View/download PDF
6. Realization of the Regional Advantageous Agricultural Industries Analysis System
- Author
-
Sun, Kaimeng, Li, Daoliang, editor, and Zhao, Chunjiang, editor
- Published
- 2010
- Full Text
- View/download PDF
7. Theoretical Framework of Technical Kinematics Evaluation Software
- Author
-
Xiaofeng, Xu, Jianyong, Di, Lixian, Jing, Yansong, Gao, Yang, Yuhang, editor, Ma, Maode, editor, and Liu, Baoxiang, editor
- Published
- 2013
- Full Text
- View/download PDF
8. The Founding, Fantastic Growth, and Fast Decline of Norsk Data AS
- Author
-
Steine, Tor Olav, Impagliazzo, John, editor, Lundin, Per, editor, and Wangler, Benkt, editor
- Published
- 2011
- Full Text
- View/download PDF
9. Norwegian Computer Technology: Founding a New Industry
- Author
-
Lundh, Yngvar, Impagliazzo, John, editor, Lundin, Per, editor, and Wangler, Benkt, editor
- Published
- 2011
- Full Text
- View/download PDF
10. The History of Computers and Computing in Virtual Museums
- Author
-
Polak, Yuri, Impagliazzo, John, editor, and Proydakov, Eduard, editor
- Published
- 2011
- Full Text
- View/download PDF
11. Increasing the Museum Value of Information Technology Objects : The Case of the Finnish Data Processing Museum Association
- Author
-
Tittonen, Emmi, Impagliazzo, John, editor, Järvi, Timo, editor, and Paju, Petri, editor
- Published
- 2009
- Full Text
- View/download PDF
12. Hostile Blockchain Takeovers (Short Paper)
- Author
-
Joseph Bonneau
- Subjects
Blockchain ,Computer science ,Process (engineering) ,05 social sciences ,Short paper ,Face (sociological concept) ,02 engineering and technology ,Adversary ,Computer security ,computer.software_genre ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Protocol (object-oriented programming) ,050203 business & management - Abstract
Most research modelling Bitcoin-style decentralised consensus protocols has assumed profit-motivated participants. Complementary to this analysis, we revisit the notion of attackers with an extrinsic motivation to disrupt the consensus process (Goldfinger attacks). We outline several routes for obtaining a majority of decision-making power in the consensus protocol (a hostile takeover). Our analysis suggests several fundamental differences between proof-of-work and proof-of-stake systems in the face of such an adversary.
- Published
- 2019
13. An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature
- Author
-
Pramote Kuacharoen, Puchong Subpratatsavee, Kasetsart University (KU), National Institute of Development Administration |Bangkok] (NIDA), Khalid Saeed, Václav Snášel, and TC 8
- Subjects
Government ,Authentication ,Computer science ,business.industry ,[SHS.INFO]Humanities and Social Sciences/Library and information sciences ,Paper based ,Computer security ,computer.software_genre ,Barcode ,law.invention ,Software ,Digital signature ,paper-based document ,digital signature ,law ,Loan ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,authentication ,[INFO]Computer Science [cs] ,HC2D barcode ,Communication source ,business ,computer - Abstract
Part 8: Pattern Recognition and Image Processing; International audience; Paper-based documents are important and still widely used in government agencies and private entities as some documents cannot be replaced by electronic documents. These include loan agreements, dispatch or contracts, household registrations and passports. They must be paper-based. Paper-based documents can be easily forged with a printer and a scanner, and imaging software can easily edit them. This paper presents a paper-based document authentication by applying a digital signature and HC2D barcode to verify the integrity of the text message and the sender of the document. This is useful both for a quick inspection of documents with large quantities and monitoring that may help prevent fraud and forgery which may have occurred.
- Published
- 2014
14. Item Differential in Computer Based and Paper Based Versions of a High Stakes Tertiary Entrance Test: Diagrams and the Problem of Annotation
- Author
-
Brad Jackel
- Subjects
Diagrammatic reasoning ,Annotation ,Multimedia ,business.industry ,Computer science ,Computer based ,Standardized test ,Paper based ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing - Abstract
This paper presents the results from a tertiary entrance test that was delivered to two groups of candidates, one as a paper based test and the other as a computer based test. Item level differential reveals a pattern that appears related to item type: questions based on diagrammatic stimulus show a pattern of increased difficulty when delivered on computer. Differential in performance was not present in other sections of the test and it would appear unlikely to be explained by demographic differences between the groups. It is suggested this differential is due to the inability of the candidates to freely annotate on the stimulus when delivered on computer screen. More work needs to be done on considering the role of annotation as a problem solving strategy in high-stakes testing, in particular with certain kinds of stimulus, such as diagrams.
- Published
- 2014
15. A Short Paper on the Incentives to Share Private Information for Population Estimates
- Author
-
Jens Grossklags, Patrick Loiseau, and Michela Chessa
- Subjects
Population estimate ,Incentive ,Analytics ,business.industry ,Computer science ,Internet privacy ,Short paper ,Data analysis ,business ,Computer security ,computer.software_genre ,Private information retrieval ,computer - Abstract
Consumers are often willing to contribute their personal data for analytics projects that may create new insights into societal problems. However, consumers also have justified privacy concerns about the release of their data.
- Published
- 2015
16. Survey of Pen-and-Paper Computing
- Author
-
Jürgen Steimle
- Subjects
Engineering ,Paper document ,Work (electrical) ,business.industry ,Interface (computing) ,Perspective (graphical) ,Optical character recognition ,Paper computing ,computer.software_genre ,business ,Data science ,computer ,Field (computer science) - Abstract
Over several decades, a large body of research has been established that focuses on Pen-and-Paper Computing. This chapter reviews previous work of the field – both from a technological and interface perspective – and discusses future directions of research and development.
- Published
- 2012
17. Users Can Do Better with PDAs Than Paper: A Usability Study of PDA-Based vs. Paper-Based Nursing Documentation Systems
- Author
-
Celia R. Colón-Rivera, Carlos Martinez, Néstor J. Rodríguez, José A. Borges, Aixa Ardín, Carlos Perez, and Gilberto Crespo
- Subjects
Nursing staff ,Multimedia ,business.industry ,Computer science ,Medical record ,Usability ,Paper based ,computer.software_genre ,Patient record ,Health informatics ,Nursing documentation ,business ,Mobile device ,computer - Abstract
Personal Digital Assistants (PDAs) are a viable technology for providing access to Electronic Medical Records at the point-of-care. However, acceptance of this technology by clinicians will depend on how easy they can make the transition from the system they normally use to a PDA-based system. Since many hospitals are still using paper-based patient record systems this study intends to provide some insight on the aspects that need to be considered in the transition from a paper-based system to a PDA-based system. The study compares the interaction of nurses with PDA-based and paper-based nursing documentation systems in terms of performance and subjective satisfaction. Twenty staff nurses from a metropolitan hospital performed twelve tasks on each system. The study supports the conclusion that a PDA-based nursing documentation system can be superior to a paper-based system in term of performance for tasks that don't required writing notes. Nurses were significantly more satisfied with the PDA-based system than with the paper-based system with every interaction and system aspect evaluated on the study. In general the results of the study provide hard evidence to predict an easy transition for nurses from a paper-based system to a PDA-based system nursing documentation system.
- Published
- 2009
18. Evaluating Paper Prototype for Tabletop Collaborative Game Applications
- Author
-
Ricardo Nakamura, Mauricio Cirelli, Lucia Vilela Leite Filgueiras, and Marylia Gutierrez
- Subjects
Game design ,Multimedia ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Computer science ,Human–computer interaction ,Interface (Java) ,Collaborative game ,User interface ,computer.software_genre ,computer ,Gesture ,Paper prototyping - Abstract
Identifying the natural gestures for a tabletop application is one of the most challenging tasks developers must accomplish in order to achieve a good system user interface. This problem is even more difficult in a collaborative environment. Cooperative Gestures allow richer interaction and must be evaluated when designing a new multi-user tabletop interface. In this paper we present the use of paper prototyping to analyze user interaction on a tabletop collaborative game application. Our results show that it is possible to extract natural gestures for an application using this technique, regardless of some limitations.
- Published
- 2013
19. ECOTRUCK: An Agent System for Paper Recycling
- Author
-
Ilias Sakellariou, Nikolaos Bezirgiannis, Utrecht University [Utrecht], University of Macedonia [Thessaloniki] (UoM), Lazaros Iliadis, Ilias Maglogiannis, Harris Papadopoulos, TC 12, and WG 12.5
- Subjects
Functional Logic Programming ,Functional logic programming ,Computer science ,Erlang (programming language) ,Erlang ,02 engineering and technology ,12. Responsible consumption ,020202 computer hardware & architecture ,Transport engineering ,Paper recycling ,Risk analysis (engineering) ,Management system ,Vehicle routing problem ,0202 electrical engineering, electronic engineering, information engineering ,Agent Systems ,[INFO]Computer Science [cs] ,020201 artificial intelligence & image processing ,computer ,Contract-Net ,Declarative programming ,computer.programming_language - Abstract
Part 13: Environmental and Earth Applications of AI; International audience; Recycling has been gaining ground, thanks to the recent progress made in the related technology. However, a limiting factor to its wide adoption, is the lack of modern tools for managing the collection of recyclable resources. In this paper, we present EcoTruck, a management system for the collection of recyclable paper products. EcoTruck is modelled as a multi-agent system and its implementation employs Erlang, a distribution-oriented declarative language. The system aims to automate communication and cooperation of parties involved in the collection process, as well as optimise vehicle routing. The latter have the effect of minimising vehicle travel distances and subsequently lowering transportation costs. By speeding up the overall recycling process, the system could increase the service throughput, eventually introducing recycling methods to a larger audience.
- Published
- 2011
20. Study on the Application of RFID Technology in the Management System of Paper Machine’s Disassembly and Assembly
- Author
-
Xiuqing Wang, Chunxia Zhang, and Xian Zhang
- Subjects
Information management ,SQL ,business.product_category ,Computer science ,business.industry ,Serial communication ,Interface (computing) ,Construct (python library) ,Management information systems ,Paper machine ,Embedded system ,Management system ,business ,Software engineering ,computer ,computer.programming_language - Abstract
This paper takes the management system of paper machine’s disassembly and assembly as research objects, and introduces RFID technology as well as the application of RFID. Then it establishes basic information management of paper machine, marking information management, installation information management, serial communication and other functional modules. The monitoring system adopts VC6.0 and SQL as the original developing tools. At first, it needs to analyse and construct system functional modules of paper machine, then it designs engineering framework-a kind of visual user management interface- in VC platform. Finally, it does the mapping coefficient and data transmitting from the engineering framework to database by ADO database access.
- Published
- 2011
21. An Intelligent Shopping List - Combining Digital Paper with Product Ontologies
- Author
-
Sandra Thieme, Gerrit Kahl, Andreas Dengel, and Marcus Liwicki
- Subjects
Product (business) ,World Wide Web ,Information extraction ,Parsing ,Computer science ,Order (business) ,Shopping mall ,Ontology ,Ontology (information science) ,computer.software_genre ,computer ,Shopping list ,Digital paper - Abstract
This paper proposes a novel system which automatically extracts the intended items to buy from a hand written shopping list. This intelligent shopping list relies on an ontology of the products which is provided by the shopping mall. In our scenario the shopping list is written on digital Anoto paper. After transmitting the hand written strokes to the computer, the list items are recognized by a hand writing recognition system. Next, the recognized text is parsed in order to detect the amount and the desired item. This is then matched to the underlying ontology and the intended order is recognized. Our current prototype works on an ontology of 300 products. In our real-world experiments we asked 20 persons to write shopping lists without any constrains.
- Published
- 2011
22. Coding a Simulation Model of the 3D Structure of Paper
- Author
-
António Portugal, Eduardo L. T. Conceição, Rogério Simões, and Joana M. R. Curto
- Subjects
Paper sheet ,Theoretical computer science ,Source code ,Computer science ,business.industry ,media_common.quotation_subject ,Stacking ,Complex system ,3D modeling ,Cellular automaton ,MATLAB ,business ,computer ,Coding (social sciences) ,computer.programming_language ,media_common - Abstract
Almost everyone agrees on the central role that simulation plays in the understanding of complex systems such as the 3D network formed by stacking millions of fibers on top of each other in a paper sheet. Clearly, the computational implementation of the few models which describe the microstructure of paper is far from trivial. Unfortunately, to our knowledge, there is no description in the literature of the methodology used for programming these algorithms. As a contribution towards overcoming this gap, the present article explains the software implementation of key features of a 3D random fiber deposition model into a high-level MATLAB computer code.
- Published
- 2010
23. Towards Secure Bioinformatics Services (Short Paper)
- Author
-
Heike Schröder, Björn Deiseroth, Martin Franz, Stefan Katzenbeisser, Somesh Jha, and Kay Hamacher
- Subjects
Sequence ,Oblivious transfer ,Computer science ,Computation ,String (computer science) ,Short paper ,Forward algorithm ,Intellectual property ,Bioinformatics ,Hidden Markov model ,Computer security ,computer.software_genre ,computer - Abstract
In this paper we show how privacy of genomic sequences can be protected while they are analyzed using Hidden Markov Models (HMM), which is commonly done in bioinformatics to detect certain non-beneficial patterns in the genome. Besides offering strong privacy guarantees, our solution also allows protecting the intellectual property of the parties involved, which makes the solution viable for implementation of secure bioinformatics services. In particular, we show how two mutually mistrusting parties can obliviously run the forward algorithm in a setup where one party knows a HMM and another party knows a genomic string; while the parties learn whether the model fits the genome, they neither have to disclose the parameterization of the model nor the sequence to each other. Despite the huge number of arithmetic operations required to solve the problem, we experimentally show that HMMs with sizes of practical importance can obliviously be evaluated using computational resources typically found in medical laboratories. As a central technical contribution, we give improved protocols for secure and numerically stable computations on non-integer values.
- Published
- 2012
24. Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)
- Author
-
Christopher Soghoian and Sid Stamm
- Subjects
Government ,Software_OPERATINGSYSTEMS ,Transport Layer Security ,ComputingMilieux_THECOMPUTINGPROFESSION ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet privacy ,Short paper ,Certification ,Cryptographic protocol ,Computer security ,computer.software_genre ,Certificate ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Certificate authority ,Interception ,business ,computer - Abstract
This paper introduces the compelled certificate creation attack, in which government agencies may compel a certificate authority to issue false SSL certificates that can be used by intelligence agencies to covertly intercept and hijack individuals' secure Web-based communications.
- Published
- 2012
25. Fast Embedding Technique for Dirty Paper Trellis Watermarking
- Author
-
Marc Chaumont, Image & Interaction (ICAR), Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM), Anthony T.S. Ho, Yun Q. Shi, H.J Kim, and Mauro Barni
- Subjects
Scheme (programming language) ,Theoretical computer science ,Computer science ,0211 other engineering and technologies ,02 engineering and technology ,Trellis (graph) ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing ,0202 electrical engineering, electronic engineering, information engineering ,Code (cryptography) ,Digital watermarking ,computer.programming_language ,021110 strategic, defence & security studies ,Space Division Multiplexing ,[MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT] ,Viterbi decoder ,Computer engineering ,[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] ,[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV] ,Embedding ,020201 artificial intelligence & image processing ,Dirty Paper Trellis Codes ,Fast projections ,Robust high rate watermarking ,[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing ,computer - Abstract
International audience; This paper deals with the improvement of the Dirty Paper Trellis Code (DPTC) watermarking algorithm. This watermarking algorithm is known to be one of the best among the high rate watermarking schemes. Nevertheless, recent researches reveal its security weakness. Previously, we proposed to reinforce its security by using a secret space before the embedding. This secret space requires to compute projections onto secrets carriers. When dealing with high rate watermarking, the CPU cost for those projections is dramatically high. After introducing the watermarking scheme, we then propose two Space Division Multiplexing (SDM) approaches which reduce the complexity. Evaluations are achieved with four different attacks and show that our proposal gives better robustness results with SDM approaches.
- Published
- 2009
26. Tactile Paper Prototyping with Blind Subjects
- Author
-
Mei Miao, Wiebke Köhlmann, Gerhard Weber, and Maria Schiewe
- Subjects
Design stage ,Multimedia ,Computer science ,business.industry ,Visually impaired ,Usability ,User centred design ,computer.software_genre ,Human–computer interaction ,Evaluation methods ,User interface ,business ,computer ,Paper prototyping ,Haptic technology - Abstract
With tactile paper prototyping user interfaces can be evaluated with blind users in an early design stage. First, we describe two existing paper prototyping methods, visual and haptic paper prototyping, and indicate their limitations for blind users. Subsequently, we present our experiences while preparing, conducting and analysing tests performed using tactile paper prototyping. Based on our experiences, we provide recommendations for this new usability evaluation method.
- Published
- 2009
27. Virtual Artistic Paper-Cut
- Author
-
Minyong Shi, Hanwen Guo, Zhiguo Hong, Rui Yang, and Li Zhang
- Subjects
Computer science ,business.industry ,Polygon clipping ,Paper cut ,Scalable Vector Graphics ,Extraction algorithm ,computer.file_format ,medicine.disease ,Computer graphics (images) ,medicine ,business ,computer ,ComputingMethodologies_COMPUTERGRAPHICS ,Subdivision - Abstract
This paper presents some algorithms for a novel simulation of the folding and cut crafts in Chinese Paper-cut. All algorithms in simulation are designed by consideration of the real Paper-cut's whole process. We applies area filling algorithm, polygon clipping algorithm, contour extraction algorithm and subdivision curve algorithm, with the proper improvement that meets the technique of the art in the nature, to yield some vivid Paper-cut works. Our approach is feasible to anyone with the desire, due to Paper-cut illumines itself in 2D and all the operations are also in 2D.Moverover, recent compelling graphic systems, such as Flash, Photoshop, Maya and 3DMax, did not provide a similar interface for paper's fold and decorative pattern which are primary elements in Paper-cut. However, our approach not only meets the interest of the Paper-cut, but also holds an interface for these compelling systems because of measuring up the SVG.
- Published
- 2008
28. An Evaluation Framework for Analytical Methods of Integrating Electronic Word-of-Mouth Information: Position Paper
- Author
-
Kazunori Fujimoto
- Subjects
Set (abstract data type) ,Probabilistic classification ,Information retrieval ,Computer science ,Encoding (memory) ,Models of communication ,Probabilistic logic ,Position paper ,Data mining ,computer.software_genre ,Representation (mathematics) ,computer ,Decoding methods - Abstract
This paper presents an evaluation framework for analytical methods of integrating eWOM Information. This framework involves a communication model that assumes a set of human subjective probabilities called an belief source and includes two translation processes: (1) encoding the belief source into a representation to communicate with a computer; these encoded messages are called eWOM messages, and (2) in the computer, decoding the eWOM messages to estimate the probabilities in the belief source. The efficiency of reducing the difficulty of describing the belief source and the accuracy of reconstructing the belief source are quantitated using this model. The evaluation processes are illustrated with an analytical method of integrating eWOM messages for probabilistic classification problems.
- Published
- 2010
29. A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)
- Author
-
Ian Welch, Kris Bubendorfer, and Ben Palmer
- Subjects
business.industry ,Computer science ,Internet privacy ,Short paper ,Computer security ,computer.software_genre ,Purchasing ,Work (electrical) ,The Internet ,Reseller ,business ,Database transaction ,Protocol (object-oriented programming) ,computer ,Anonymity - Abstract
An increasing number of Internet traders exclusively sell digital products. These digital products can include media files, licenses, services, or subscriptions. We consider the concept of digital provenance in reseller chains. The goal of this work is to provide an honest customer with a guarantee on the origin and ownership history for a digital item even when the reseller they are dealing with is untrusted. We introduce a protocol called the Tagged Transaction protocol which uses a third party called the Tag Generation Centre (TGC) to provide a method for honest customers to check they are purchasing a legitimate item, anonymity for customers and resellers, a method for customers to resell items they have purchased to other customers, and verification of the TGC.
- Published
- 2012
30. Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)
- Author
-
Vishnu Kamisetty, Pawankumar Yedugani, and Ravi Mukkamala
- Subjects
Software_OPERATINGSYSTEMS ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Short paper ,Access control ,computer.software_genre ,Computer security ,Expert system ,Set (abstract data type) ,System administrator ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Role-based access control ,business ,computer - Abstract
In Role Based Access Control (RBAC) systems, formulating a correct set of roles, assigning appropriate privileges to roles, and assigning roles to users are the fundamental design tasks. Whether these tasks are performed by a human (e.g., system administrator) or by a machine (e.g., expert system), misconfigurations are likely to occur. The misconfigurations could manifest as under-privileges (fewer privileges assigned) or over-privileges (more privileges than necessary). In this paper, we describe an approach based on role mining to detect and correct such misconfigurations. Here, the overlap among the users and privileges of different roles is used to identify possible misconfigurations.
- Published
- 2009
31. The Research and Application of Fuzzy Entropy Weight Comprehensive Evaluation Method in Paper Quality Evaluation
- Author
-
Baoxiang Liu and Cuilan Mi
- Subjects
Fuzzy entropy ,Computer science ,Test quality ,Evaluation methods ,Weight distribution ,Entropy (information theory) ,Paper quality ,Weight coefficient ,Data mining ,computer.software_genre ,computer ,Simulation ,Standard deviation - Abstract
According to the fuzziness of Each index in Test quality evaluation, The entropy value theory of information will be used to test quality evaluation, use The difficulty, degree of differentiate, believe degree, validity and the standard deviation. As the impact of the test quality evaluation index. Establish a comprehensive evaluation index system, Using the information entropy as evaluation index weight coefficient, which can effectively solve the weight distribution difficulties. Weight is an objectivity, This method is a new test quality evaluation method, and connecting with the example of application, The results show that the method was simple, practical and reliable.
- Published
- 2011
32. Advanced Paper Document in a Projection Display
- Author
-
Kwangjin Hong and Keechul Jung
- Subjects
Interactive computing ,Multimedia ,Paper document ,Computer science ,Gesture recognition ,media_common.quotation_subject ,Projection display ,Natural (music) ,computer.software_genre ,Function (engineering) ,computer ,Desk ,media_common - Abstract
Though computing environments are developed very rapidly, people use paper documents as ever. In this paper, we propose the Advanced Paper Document (APD), which expands the function of paper documents, based on the Augmented Desk system. To incorporate physical paper documents with digital documents in a projection display system without being required to use additional sensors, we use a gesture recognition method. The APD has advantages of paper and digital documents, and provides a user with a natural and intuitive environment. As shown by experimental results, the proposed the APD is applicable to provide an interactive computing environment.
- Published
- 2004
33. Paper on the Move
- Author
-
Moira C. Norrie
- Subjects
Ubiquitous computing ,Concurrent engineering ,Multimedia ,Computer science ,business.industry ,Electronic document ,Mobile computing ,computer.software_genre ,Telecommunications ,business ,computer ,Tourism ,Digital paper - Abstract
We examine the properties and use of paper in everyday settings and discuss the motivation for retaining paper as an information medium. In particular, we consider the use of paper maps and guidebooks by tourists during city visits as an example of a mobile and collaborative environment. We then go on to present recent developments in technologies for digital paper and how they can be used to seamlessly integrate digital and printed information.
- Published
- 2004
34. A Short Paper on Blind Signatures from Knowledge Assumptions
- Author
-
Lucjan Hanzlik and Kamil Kluczniak
- Subjects
Theoretical computer science ,Computer science ,String (computer science) ,0102 computer and information sciences ,02 engineering and technology ,Okamoto–Uchiyama cryptosystem ,Approx ,computer.software_genre ,01 natural sciences ,Signature (logic) ,Random oracle ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Blind signature ,020201 artificial intelligence & image processing ,Data mining ,Impossibility ,computer ,Standard model (cryptography) - Abstract
This paper concerns blind signature schemes. We focus on two moves constructions, which imply concurrent security. There are known efficient blind signature schemes based on the random oracle model and on the common reference string model. However, constructing two move blind signatures in the standard model is a challenging task, as shown by the impossibility results of Fischlin et al. The recent construction by Garg et al. (Eurocrypt’14) bypasses this result by using complexity leveraging, but it is impractical due to the signature size (\(\approx \) 100 kB). Fuchsbauer et al. (Crypto’15) presented a more practical construction, but with a security argument based on interactive assumptions. We present a blind signature scheme that is two-move, setup-free and comparable in terms of efficiency with the results of Fuchsbauer et al. Its security is based on a knowledge assumption.
- Published
- 2017
35. Private eCash in Practice (Short Paper)
- Author
-
Sébastien Gambs, Solenn Brunet, Nicolas Desmoulins, Jacques Traore, Saïd Gharout, and Amira Barki
- Subjects
Scheme (programming language) ,Subscriber identity module ,Computer science ,media_common.quotation_subject ,020302 automobile design & engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Payment ,Security token ,law.invention ,ecash ,0203 mechanical engineering ,law ,0202 electrical engineering, electronic engineering, information engineering ,Blind signature ,020201 artificial intelligence & image processing ,Use case ,computer ,computer.programming_language ,media_common ,Anonymity - Abstract
Most electronic payment systems for applications, such as eTicketing and eToll, involve a single entity acting as both merchant and bank. In this paper, we propose an efficient privacy-preserving post-payment eCash system suitable for this particular use case that we refer to, afterwards, as private eCash. To this end, we introduce a new partially blind signature scheme based on a recent Algebraic MAC scheme due to Chase et al. Unlike previous constructions, it allows multiple presentations of the same signature in an unlinkable way. Using it, our system is the first versatile private eCash system where users must only hold a sole reusable token (i.e. a reusable coin spendable to a unique merchant). It also enables identity and token revocations as well as flexible payments. Indeed, our payment tokens are updated in a partially blinded way to collect refunds without invading user’s privacy. By implementing it on a Global Platform compliant SIM card, we show its efficiency and suitability for real-world use cases, even for delay-sensitive applications and on constrained devices as a transaction can be performed in only 205 ms.
- Published
- 2017
36. A Position Paper on ’Living Laboratories’: Rethinking Ecological Designs and Experimentation in Human-Computer Interaction
- Author
-
Ed H. Chi
- Subjects
Human–computer interaction ,Computer science ,Ecological design ,Position paper ,Web service ,Viewpoints ,computer.software_genre ,computer - Abstract
HCI have long moved beyond the evaluation setting of a single user sitting in front of a single desktop computer, yet many of our fundamentally held viewpoints about evaluation continues to be ruled by outdated biases derived from this legacy. We need to engage with real users in 'Living Laboratories', in which researchers either adopt or create functioning systems that are used in real settings. These new experimental platforms will greatly enable researchers to conduct evaluations that span many users, places, time, location, and social factors in ways that are unimaginable before.
- Published
- 2009
37. Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
- Author
-
Seung-Hyun Seo and Kyung-Ah Shim
- Subjects
Security analysis ,Theoretical computer science ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Short paper ,Bilinear interpolation ,Weil pairing ,Computer security ,computer.software_genre ,law.invention ,Formal design ,law ,Forward secrecy ,Key (cryptography) ,Cryptanalysis ,computer - Abstract
Recently, a number of ID-based authenticated key agreement protocols from bilinear pairings have been proposed. In this paper we present security analysis of four ID-based authenticated key agreement protocols from pairings proposed in [11, 12, 7, 18]. These results demonstrate that no more ID-based authenticated key agreement protocols should be constructed with such ad-hoc methods, i.e, the formal design methodology as in [1, 2, 3, 10] should be employed in future design.
- Published
- 2006
38. An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)
- Author
-
Ziyao Xu, Chunyang Yuan, Yeping He, and Lingli Deng
- Subjects
Scheme (programming language) ,Matching (statistics) ,business.industry ,Computer science ,Computation ,Distributed computing ,Short paper ,Peer-to-peer ,computer.software_genre ,Incentive ,File sharing ,business ,computer ,computer.programming_language ,Computer network - Abstract
Cooperation between participants is essential to P2P applications' viability. Due to obscure possibility to match peers' needs and supplies in pairs, the widely used pair-wise exchange-based incentive schemes perform poorly. The N-way exchange-based incentive scheme enlarges the matching possibility by introducing n person exchanges. But some old problems remain and some new ones emerge with the N-way design. In this paper we present an enhanced n-way exchange-based incentive scheme for P2P file sharing systems. By distributing extra tasks to all the peers involved in an n-way exchange, the proposed scheme eliminates prohibitive computation and communication cost on the cooperators, resulting in greater efficiency, effectiveness, and security.
- Published
- 2006
39. A Robust and Secure RFID-Based Pedigree System (Short Paper)
- Author
-
Chiu C. Tan and Qun Li
- Subjects
End user ,Computer science ,business.industry ,Short paper ,Computer security ,computer.software_genre ,Product (business) ,User assistance ,Food products ,Identity (object-oriented programming) ,Radio-frequency identification ,business ,computer ,Pharmaceutical industry - Abstract
There has been considerable interest recently on developing a system to track items like pharmaceutical drugs or food products. Such a system can help prevent counterfeits, aid product recall, and improve general logistics. In this paper, we present such system based on radio frequency identity (RFID) technology. Our solution provides the means of storing the entire movement of the item from original manufacturer to final consumer on the RFID tag itself, and also makes it more difficult to introduce large numbers of counterfeits. The solution also allows the end user to easily verify the authenticity of the item.
- Published
- 2006
40. Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)
- Author
-
Pedro García-Teodoro, Gabriel Maciá-Fernández, and Jesús E. Díaz-Verdejo
- Subjects
Order (exchange) ,Iterative method ,Computer science ,Server ,Short paper ,Denial-of-service attack ,Round-trip delay time ,Intrusion detection system ,Computer security ,computer.software_genre ,computer ,Idle time - Abstract
A low-rate DoS attack to iterative servers has recently appeared as a new approach for defeating services using rates of traffic that could be adjusted to bypass security detection mechanisms. Although the fundamentals and effectiveness of these kind of attacks are known, it is not clear how to design the attack to achieve specific constraints based on the used rate and the efficiency in denial of service obtained. In this paper, a comprehensive mathematical framework that models the behaviour of the attack is presented. The main contribution of this model is to give a better understanding of the dynamics of these kind of attacks, in order to facilitate the development of detection and defense mechanisms.
- Published
- 2006
41. Working Group I — Requirements and Applications — Position Paper: Requirements for 3D in Geographic Information Systems Applications
- Author
-
Andrew U. Frank
- Subjects
Focus (computing) ,Geographic information system ,Information retrieval ,Database ,business.industry ,Group (mathematics) ,Computer science ,computer.software_genre ,Field (geography) ,Geographic space ,Position paper ,business ,Scale (map) ,computer - Abstract
Geoinformation systems (GIS) contain information about objects in geographic space; the focus on geographic space [1] determines the scale of spatial objects and processes of interest at a spatial resolution of approximatively 0.1 m to 40.000 km and to changes occurring once a minute to once a million years. Geographic information is a diverse field which includes many special applications, each of which has special requirements, with special kinds of geometry and particular geometric operations.
- Published
- 2008
42. Distilling Scenarios from Patterns for Software Architecture Evaluation – A Position Paper
- Author
-
Liming Zhu, Muhammad Ali Babar, and D. Ross Jeffery
- Subjects
Database ,Computer science ,business.industry ,media_common.quotation_subject ,Software development ,computer.software_genre ,Data science ,Systems architecture ,Position paper ,Quality (business) ,Software system ,business ,Software architecture ,computer ,Quality assurance ,media_common - Abstract
Software architecture (SA) evaluation is a quality assurance technique that is increasingly attracting significant research and commercial interests. A number of SA evaluation methods have been developed. Most of these methods are scenario-based, which relies on the quality of the scenarios used for the evaluation. Most of the existing techniques for developing scenarios use stakeholders and requirements documents as main sources of collecting scenarios. Recently, architectures of large software systems are usually composed of patterns and styles. One of the purposes of using patterns is to develop systems with predictable quality attributes. Since patterns are documented in a format that requires the inclusion of problem, solution and quality consequences, we observed that scenarios are, though as informal text, pervasive in patterns description, which can be extracted and documented for the SA evaluation. Thus, we claim that the patterns can be another source of collecting quality attributes sensitive scenarios. This position paper presents arguments and examples to support our claim.
- Published
- 2004
43. What is the Best Way to Allocate Teacher’s Efforts: How Accurately Should We Write on the Board? When Marking Comments on Student Papers?
- Author
-
Olga Kosheleva and Karen Villaverde
- Subjects
Multimedia ,Computer science ,Handwriting ,computer.software_genre ,Legibility ,computer - Abstract
Writing on the board is an important part of a lecture. Lecturers’ handwriting is not always perfect. Usually, a lecturer can write slower and more legibly, this will increase understandability but slow down the lecture. In this chapter, we analyze an optimal trade-off between speed and legibility.
- Published
- 2017
44. Pragmatic Aspects of Reusable Program Generators Position Paper
- Author
-
Norman F. Ramsey
- Subjects
Functional programming ,Generator (computer programming) ,Assembly language ,Computer science ,business.industry ,Real-time computing ,Program optimization ,Program analysis ,User control ,Code (cryptography) ,Position paper ,Software engineering ,business ,computer ,computer.programming_language - Abstract
When writing a program generator requires considerable intellectual effort,it is pleasant to amortize that effort by using the generator to build more than one application. When a program generator serves multiple clients,however, the implementor must address pragmatic questions that implementors of single-use program generators can ignore. In how many languages should generated code be written? How should code be packaged? What should the interfaces to the client code look like? How should a user control variations? This paper uses exam- ples from SLED, λ-RTL, and ASDL to elaborate on these questions. It is hoped that the paper will stimulate discussion and the development of better techniques. Most urgently needed is a simple, clear way to control interfaces to generated code.
- Published
- 2000
45. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)
- Author
-
Ahmad-Reza Sadeghi, Stephan Heuser, Marco Negro, and Praveen Kumar Pendyala
- Subjects
Logic bomb ,Computer science ,business.industry ,020206 networking & telecommunications ,Access control ,02 engineering and technology ,Static analysis ,Computer security ,computer.software_genre ,Application layer ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Dynamic program analysis ,Android (operating system) ,business ,computer ,Mobile device ,Privilege escalation - Abstract
Smart mobile devices process and store a vast amount of security- and privacy-sensitive data. To protect this data from malicious applications mobile operating systems, such as Android, adopt fine-grained access control architectures. However, related work has shown that these access control architectures are susceptible to application-layer privilege escalation attacks. Both automated static and dynamic program analysis promise to proactively detect such attacks. Though while state-of-the-art static analysis frameworks cannot adequately address native and highly obfuscated code, dynamic analysis is vulnerable to malicious applications using logic bombs to avoid early detection.
- Published
- 2017
46. KBID: Kerberos Bracelet Identification (Short Paper)
- Author
-
Michael Rushanan, Joseph Carrigan, and Paul D. Martin
- Subjects
Password ,Authentication ,Service (systems architecture) ,computer.internet_protocol ,Computer science ,010401 analytical chemistry ,Wearable computer ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Password strength ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Identification (information) ,Ticket ,0202 electrical engineering, electronic engineering, information engineering ,Kerberos ,computer - Abstract
The most common method for a user to gain access to a system, service, or resource is to provide a secret, often a password, that verifies her identity and thus authenticates her. Password-based authentication is considered strong only when the password meets certain length and complexity requirements, or when it is combined with other methods in multi-factor authentication. Unfortunately, many authentication systems do not enforce strong passwords due to a number of limitations; for example, the time taken to enter complex passwords. We present an authentication system that addresses these limitations by prompting a user for credentials once and then storing an authentication ticket in a wearable device that we call Kerberos Bracelet Identification (KBID).
- Published
- 2017
47. Executable and Symbolic Conformance Tests for Implementation Models (Position Paper)
- Author
-
Thomas Baar
- Subjects
Programming language ,Computer science ,business.industry ,Position paper ,Executable ,computer.file_format ,Smart card ,Architecture ,computer.software_genre ,business ,computer ,Dynamic logic (digital electronics) - Abstract
Following the Model-Driven Architecture (MDA),a system description consists of several models,i.e.views of the system.This paper is concerned with formal conformance tests between different models.It stresses the need for formal semantical foundations of all languages that are used to express models.In particular,we classify conformance tests for implementation models
- Published
- 2002
48. Applying Real-Time Scheduling Techniques to Software Processes: A Position Paper
- Author
-
Aaron G. Cass and Leon J. Osterweil
- Subjects
Software ,Database ,business.industry ,Computer science ,Position paper ,Executable ,computer.file_format ,Software engineering ,business ,computer.software_genre ,computer ,Scheduling (computing) ,Workflow technology - Abstract
Process and workflow technology have traditionally not allowed for the specification of, nor run-time enforcement of, real-time requirements, despite the fact that time-to-market and other real-time constraints are more stringent than ever. Without specification of timing constraints, process designers cannot effectively reason about real-time constraints on process programs and the efficacy of their process programs in satisfying those constraints. Furthermore, without executable semantics for those timing specifications, such reasoning might not be applicable to the process as actually executed. We seek to support reasoning about the real-time requirements of software processes. In this paper, we describe work in which we have added real-time specifications to a process programming language, and in which we have added deadline timers and task scheduling to enforce the real-time requirements of processes.
- Published
- 2001
49. Active alice: using real paper to interact with electronic text
- Author
-
Steven Lay, Richard Watts, Dan Sheppard, Heather Brown, Peter Robinson, and Robert Harding
- Subjects
World Wide Web ,Paper document ,Publishing ,business.industry ,Computer science ,Electronic document ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Electronic publishing ,computer.file_format ,business ,SGML ,computer ,Coding (social sciences) - Abstract
Many documents exist in both paper and electronic forms. Paper has many well-known advantages, but electronic texts often contain useful information that is not easily accessible from printed paper versions. SGML texts, in particular, are rich sources of additional information. The Active Alice project shows how a reader can use a paper document to access information from its corresponding electronic version without having to manipulate the electronic version via a separate computer interface.
- Published
- 1998
50. Cryptographic Assumptions: A Position Paper
- Author
-
Shafi Goldwasser and Yael Tauman Kalai
- Subjects
Cryptographic primitive ,Theoretical computer science ,business.industry ,Cryptography ,0102 computer and information sciences ,02 engineering and technology ,Cryptographic protocol ,Computer security ,computer.software_genre ,Mathematical proof ,01 natural sciences ,Computational hardness assumption ,Field (computer science) ,Random oracle ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Security of cryptographic hash functions ,business ,computer ,Mathematics - Abstract
The mission of theoretical cryptography is to define and construct provably secure cryptographic protocols and schemes. Without proofs of security, cryptographic constructs offer no guarantees whatsoever and no basis for evaluation and comparison. As most security proofs necessarily come in the form of a reduction between the security claim and an intractability assumption, such proofs are ultimately only as good as the assumptions they are based on. Thus, the complexity implications of every assumption we utilize should be of significant substance, and serve as the yard stick for the value of our proposals. Lately, the field of cryptography has seen a sharp increase in the number of new assumptions that are often complex to define and difficult to interpret. At times, these assumptions are hard to untangle from the constructions which utilize them. We believe that the lack of standards of what is accepted as a reasonable cryptographic assumption can be harmful to the credibility of our field. Therefore, there is a great need for measures according to which we classify and compare assumptions, as to which are safe and which are not. In this paper, we propose such a classification and review recently suggested assumptions in this light. This follows the footsteps of Naor Crypto 2003. Our governing principle is relying on hardness assumptions that are independent of the cryptographic constructions.
- Published
- 2015
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.