![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
670 Result(s)
-
Chapter and Conference Paper
PuzMap: Designing a Multi-sensory Puzzle Map for Children to Learn Geography
Geography is a broad subject, and maps are essential tools for learning geography. It is necessary to educate children about geography and maps at an early age. Digital educational tools play an increasingly ...
-
Chapter and Conference Paper
How Does Mobile Devices Usage Contribute to Individual’s Creativity in Cross-Cultural Settings?
The prevalence of mobile device usage is changing the main domains of the current world. In light of increasing international expatriation to meet the demands of overseas success, more empirical research shoul...
-
Chapter and Conference Paper
A Filed Study of External HMI for Autonomous Vehicles When Interacting with Pedestrians
Interacting with pedestrians is an inevitable situation when vehicles are driven on the road. Drivers normally explain their driving intention with speed, headlights and vehicle horns. Especially, when the dis...
-
Chapter and Conference Paper
Improving Access and Mental Health for Youth Through Virtual Models of Care
The overall objective of this research is to evaluate the use of a mobile health smartphone application (app) to improve the mental health of youth between the ages of 14–25 years, with symptoms of anxiety/dep...
-
Chapter and Conference Paper
Mobile Game Theory with Street Gangs
Gang violence remains a persistent public safety problem in Los Angeles. Gang interventionists and community organizers are turning to proactive peacekee**, a process of addressing the underlying structures th...
-
Chapter and Conference Paper
Mind the Propagation of States
Impossible differentials cryptanalysis and impossible polytopic cryptanalysis are the most effective approaches to estimate the security of block ciphers. However, the previous automatic search methods of thei...
-
Chapter and Conference Paper
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum attack on hash functions—a quantum version of the rebound attack exploiting differentials whose probabilities are too low to be use...
-
Chapter and Conference Paper
Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting)
We study the concrete security of high-performance implementations of half-gates garbling, which all rely on (hardware-accelerated) AES. We find that current instantiations using k-bit wire labels can be complete...
-
Chapter and Conference Paper
Designing a Dashboard Visualization Tool for Urban Planners to Assess the Completeness of Streets
This paper presents a design study for a novel interactive web-based visualization tool that utilizes a “Complete Streets” model to support urban planners and engineers to design streets in urban areas more ef...
-
Chapter and Conference Paper
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Algebraically simple PRFs, ciphers, or cryptographic hash functions are becoming increasingly popular, for example due to their attractive properties for MPC and new proof systems (SNARKs, STARKs, among many o...
-
Chapter and Conference Paper
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far and it remains an open prob...
-
Chapter and Conference Paper
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
Higher-order masking countermeasures provide strong provable security against side-channel attacks at the cost of incurring significant overheads, which largely hinders its applicability. Previous works towar...
-
Chapter and Conference Paper
Rounding in the Rings
In this work, we conduct a comprehensive study on establishing hardness reductions for (Module) Learning with Rounding over rings (RLWR). Towards this, we present an algebraic framework of LWR, inspired by a r...
-
Chapter and Conference Paper
SOS-EW: System for Overdose Spike Early Warning Using Drug Mover’s Distance-Based Hawkes Processes
Opioid addictions and overdoses have increased across the U.S. and internationally over the past decade. In urban environments, overdoses cluster in space and time, with 50% of overdoses occurring in less tha...
-
Chapter and Conference Paper
Toward Holistic Integration of Computing and Wireless Networking
To systematically cop complex systems engineering in Internet of Things, this paper looks into a technological challenge to effectively and efficiently integrate computing and wireless networking. One aspect i...
-
Chapter and Conference Paper
Black-Box Use of One-Way Functions is Useless for Optimal Fair Coin-Tossing
A two-party fair coin-tossing protocol guarantees output delivery to the honest party even when the other party aborts during the protocol execution. Cleve (STOC–1986) demonstrated that a computationally bound...
-
Chapter and Conference Paper
Alzette: A 64-Bit ARX-box
S-boxes are the only source of non-linearity in many symmetric primitives. While they are often defined as being functions operating on a small space, some recent designs propose the use of much larger ones (e...
-
Chapter and Conference Paper
Gender Difference in Preference for Apple Watch Dial Interface
This study uses the dial interface of Apple Watch Series 5 as a research sample to explore the preferences of different genders for the visual style of the Apple Watch dial interface, and analyze the gender di...
-
Chapter and Conference Paper
VLC-Enabled Human-Aware Building Management System
“Smart” buildings that can sense and detect people’s presence have been in use for the past few decades, mostly using technologies that trigger reactive responses such as turning on/off heating/ventilating, li...
-
Chapter and Conference Paper
Improving GP-UCB Algorithm by Harnessing Decomposed Feedback
Gaussian processes (GPs) have been widely applied to machine learning and nonparametric approximation. Given existing observations, a GP allows the decision maker to update a posterior belief over the unknown...