Filters








63 Hits in 8.0 sec

Secure user authentication in cloud computing management interfaces

Liliana F. B. Soares, Diogo A. B. Fernandes, Mario M. Freire, Pedro R. M. Inacio
2013 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC)  
A prototype using readily available tools shows the feasibility of implementing such a model in practice using smartcard-based authentication, in this case.  ...  Likewise, authentication is evolving to device-centric and user-centric, combating the efficacy of spam and phishing techniques.  ... 
doi:10.1109/pccc.2013.6742763 dblp:conf/ipccc/SoaresFFI13 fatcat:3aunlc733nbqboqi52332omp5y

Radio frequency identification

Sylvain Bureau, Markus Bick, Selwyn Piramuthu, Yannick Meiller, Wei Zhou, Samuel Fosso Wamba
2010 Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services - iiWAS '10  
A case study is undertaken on the New Ticket and Payment System project (NBB) of AS Oslo Sporveier. A user survey is also conducted on the users of AS Oslo Sporveier.  ...  Radio Frequency Identification Transition to digital ticketing systems, an empirical investigation into the use of tickets Master Thesis Foreword This thesis is the result of a work project that constitutes  ...  In smart-card-based systems, digital packets of rights (digital ticket) are stored in a smartcard and circulated among smartcards.  ... 
doi:10.1145/1967486.1967638 dblp:conf/iiwas/BureauBPMZW10 fatcat:fe6rg5ma6jbtxfjm7v32u62uay

Survey on Transaction Verification Model based on Blockchain Architecture

2021 International Journal of Advanced Trends in Computer Science and Engineering  
Similar to decentralized communication systems, a new technology called Blockchain (BC) has the potential to store and manage data in a decentralized manner.  ...  By removing the role of third party, all member in the chain has equal access to data.  ...  A membership service is used to register a patient in the system, creates a public/private key pair using AES. 2.  ... 
doi:10.30534/ijatcse/2021/1191032021 fatcat:6j2ix4bkpbcpjjls6wm4blmsiy

Towards new methods for mobility data gathering

Anders Lindgren
2009 Proceedings of the 1st ACM International Workshop on Hot Topics of Planet-Scale Mobility Measurements - HotPlanet '09  
Unfortunately, much of this has had little impact as the results have not been applicable to reality, due to incorrect assumptions and models used in the design and evaluation of the systems.  ...  In this paper, we outline some of the problems of the assumptions of early research in the field, and provide a survey of some initial work that has started to take place to alleviate this through more  ...  This work has been carried out in the IST 7th Frame-work Programme Integrated Project 4WARD, funded in part by the Commission of the European Union.  ... 
doi:10.1145/1651428.1651433 dblp:conf/mobisys/Lindgren09 fatcat:mru6fqor5fchpgiisrjglehcua

Technology and Innovations: Empowering Citizens for Future Liveable Cities

2020 Regular Issue  
Not only provision of good infrastructure and continuous energy supply can make a city liveable but people need to be aware of the facts and the conditions and engage themselves in governance system by  ...  To understand the city level issues information about the urban systems to information at a lower scale need to be propelled to the citizens where technology and innovations are the strings linking different  ...  'Fix my street' in London is a web service to help people report, view and to discuss their local problems with their local council by simply locating them on a map.  ... 
doi:10.35940/ijmh.k1027.0741120 fatcat:sn5fa2eyzfbm7hzvxe7cpi4c2i

Experiencing the future mundane

RTD Conference, Paul Coulton, Josepth Lindley, Adrian Gradinar, James Colley, Neelima Sailaja, Andy Crabtree, Ian Forrester, Lianne Kerlin
2019 Figshare  
In addition to this media-delivery aspect, the LRoTF explores data protection issues that arise from OBM's use of databy integrating with the privacy-enhancing Databox system.  ...  While the 'World Building' approach to Design Fiction describes strategies that place emerging technologies in potential futures, this work expands the scope of these prototypes to create a world within  ...  creating the content used in original version of the LRofTF, and Davy Smith from the University of York for access to his OBM tool.  ... 
doi:10.6084/m9.figshare.7855790.v1 fatcat:5emuon5h45c2nmvuul3za2gimm

High-Level Simulation for Multiple Fault Injection Evaluation [chapter]

Maxime Puys, Lionel Rivière, Julien Bringer, Thanh-ha Le
2015 Lecture Notes in Computer Science  
Faults injection attacks have become a hot topic in the domain of smartcards.  ...  In addition to an unprotected CRT-RSA implementation, we successfully attacked two countermeasures with the high-level simulation under the data fault model.  ...  Finally, we proposed a set of criteria and metrics in order to regroup attacks found and quantify in term of security the robustness of an implementation.  ... 
doi:10.1007/978-3-319-17016-9_19 fatcat:xoe2wvf7gfhzvp6ep3m32s3nvm

Interacting with mobile services: an evaluation of camera-phones and visual tags

Eleanor Toye, Richard Sharp, Anil Madhavapeddy, David Scott, Eben Upton, Alan Blackwell
2006 Personal and Ubiquitous Computing  
We present a study of using camera-phones and visual-tags to access mobile services.  ...  Firstly, a userexperience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed about their experiences.  ...  Acknowledgements The authors would like to thank Rob Ennals for his valuable comments and suggestions.  ... 
doi:10.1007/s00779-006-0064-9 fatcat:nutz5cmpmfhtzbct4zruw6265m

Experiencing the future mundane

RTD Conference, Paul Coulton, Josepth Lindley, Adrian Gradinar, James Colley, Neelima Sailaja, Andy Crabtree, Ian Forrester, Lianne Kerlin
2019 Figshare  
In addition to this media-delivery aspect, the LRoTF explores data protection issues that arise from OBM's use of databy integrating with the privacy-enhancing Databox system.  ...  While the 'World Building' approach to Design Fiction describes strategies that place emerging technologies in potential futures, this work expands the scope of these prototypes to create a world within  ...  creating the content used in original version of the LRofTF, and Davy Smith from the University of York for access to his OBM tool.  ... 
doi:10.6084/m9.figshare.7855790 fatcat:3wysqqhijzgcpiojq3imxaq7bu

The Survey on Near Field Communication

Vedat Coskun, Busra Ozdenizci, Kerem Ok
2015 Sensors  
In order to engage in an NFC interaction, a user needs to touch her smartphone alternatively to an NFC tag, another smartphone, or an NFC reader.  ...  The strength of NFC technology arises from its ease of use by triggering the communication just with a simple touch in a short distance, and terminating the communication immediately as the devices detach  ...  Scanning interactions allow the user to get a list of nearby smart objects by using a wireless mechanism, and then select one of them afterwards.  ... 
doi:10.3390/s150613348 pmid:26057043 pmcid:PMC4507650 fatcat:ddxjqx2cebaopdxpg6jyctjsei

Self-Organising Maps in Computer Security [article]

Jan Feyereisl, Uwe Aickelin
2016 arXiv   pre-print
The field of computer security tends to accept the latter view as a more appropriate approach due to its more workable validation and verification possibilities.  ...  In this chapter a review of security related SOM research undertaken in the past is presented and analysed.  ...  A visual representation is subsequently presented to administrators in order for them to be able to make an informed decision in case of unacceptable user behaviour.  ... 
arXiv:1608.01668v1 fatcat:ltz4fa4jhfbzvdymt3vpqbaofa

An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers

Fang Zuo, Wei Zhang
2014 Journal of Networks  
The DAIM model uses a group of standard switches, databases, and corresponding between them by using DAIM agents.  ...  This paper explores an introduction to networks programmability, by distributing independent computing environment, which would be demonstrated through a structured system named DAIM model (Distributed  ...  One is the mission to carry a hot coil into the coil-yard, and the other is the one to carry a cool-downed coil out to be in a special mark.  ... 
doi:10.4304/jnw.9.01.10-17 fatcat:tbmafdamk5am7a6ba26gsxzydq

DIY for CHI

Leah Buechley, Daniela K. Rosner, Eric Paulos, Amanda Williams
2009 Proceedings of the 27th international conference extended abstracts on Human factors in computing systems - CHI EA '09  
of DIY Social implications of DIY DIY and education DIY communities DIY and marginalized groups DIY in developing countries  ...  Topics include but are not limited to: and handiwork Sustainable practices Reuse, repair and economic necessity Open source software Open source hardware Political implications of DIY Economic implications  ...  In a pinch, you can change babies anywhere you can lay them down, but long term, for the sake of your back, waist height is best.  ... 
doi:10.1145/1520340.1520750 dblp:conf/chi/BuechleyRPW09 fatcat:zbmldbatmngh3par3o62bldo4y

The AI is now in session – The impact of digitalisation on courts

Dorottya Papp, Bernadett Krausz, Franciska Gyuranecz
2022 Cybersecurity and Law  
In the era of digitalisation, we are only a step from using AI in our daily work.  ...  We analysed several aspects of the right to a fair trial with regard to the changes imposed by AI systems.  ...  Non-discrimination The principle of non-discrimination is deeply rooted in our judicial system. However, when using AI tools, we need to put this requirement under more scrutiny.  ... 
doi:10.35467/cal/151833 fatcat:u3amzbzyhvfxfm36vdkmmh3vou

Virtual and Augmented Reality

Victoria Interrante, Tobias Hollerer, Anatole Lecuyer
2018 IEEE Computer Graphics and Applications  
These different forms of security breaches, observed across diverse cyber physical systems, will be put in a well-characterized taxonomy, to be systematically identified as attack surfaces.  ...  Design and implement a working system using available tools based on the concepts and mathematics learnt in this course Course Content Course Aims This course aims to develop your ability to identify  ...  Building on this foundation, you will also learn how to implement a time-critical system using a drone-based platform.  ... 
doi:10.1109/mcg.2018.021951630 fatcat:qbnwukkylvf7dacyk2ko5fval4
« Previous Showing results 1 — 15 out of 63 results