![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Computational Thinking (CT) Problem Solving Orientation Based on Logic-Decomposition-Abstraction (LDA) by Rural Elementary School Children Using Visual-Based Presentations
This qualitative and ethnographic study examines how interactions embedded in the Collaborative Computational Thinking Design Practices (CCTDP) framework, has helped rural children think to solve STEM related ...
-
Chapter and Conference Paper
Position: GDPR Compliance by Construction
New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...
-
Chapter and Conference Paper
Trends and Opportunities for Traffic Engineering Paradigms Across Mobile Cellular Network Generations
Traffic engineering is at the heart of telecommunications engineering. In telecommunication engineering, we have recently experienced a revolution in the form of mobile cellular network generations. History sh...
-
Chapter and Conference Paper
Structure-Preserving Certificateless Encryption and Its Application
Certificateless encryption (CLE) combines the advantages of public-key encryption (PKE) and identity-based encryption (IBE) by removing the certificate management of PKE and the key escrow problem of IBE. In t...
-
Chapter and Conference Paper
Hardware Assisted Randomization of Data
Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space ...
-
Chapter and Conference Paper
Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security
Blockchain is a promising infrastructural technology that is finding its way into a growing number of domains like big data, finance, and medical. While blockchain has come to be thought of primarily as the f...
-
Chapter and Conference Paper
Distributed Time-Memory Tradeoff Attacks on Ciphers
In this paper, we consider the implications of parallelizing time-memory tradeoff attacks using a large number of distributed processors. It is shown that Hellman’s original tradeoff method and the Biryukov-Sh...
-
Chapter and Conference Paper
Facilitating Social Harmony Through ICTs
Social Harmony involves the peaceful interaction of people in a social setting. In this keynote address I briefly examine the historical antecedents of social harmony and identify some of the salient barriers ...
-
Chapter and Conference Paper
Speech Authentication and Recovery Scheme in Encrypted Domain
This paper proposes a self-embedding fragile watermarking scheme in encrypted speech based on hyper-chaotic system and reference sharing mechanism. Hyper-chaotic system is introduced to hide the feature and im...
-
Chapter and Conference Paper
The Planning of Smart City to Mitigate the Impacts of Natural Disaster in North Sumatera
This article introduces the smart urban planning in the mitigation of natural disasters in urban areas in Indonesia especially North Sumatera. A smart city is a city-based social development, capital, citizen ...
-
Chapter and Conference Paper
Privacy-Preserving Multi-pattern Matching
Multi-pattern matching compares a large set of patterns against a given query string, which has wide application in various domains such as bio-informatics and intrusion detection. This paper presents a privac...
-
Chapter and Conference Paper
Towards Proofs of Ownership Beyond Bounded Leakage
Cloud servers save their storage cost by applying deduplication. Duplicated copies of the same file uploaded by the cloud service clients can be reduced to a single copy by maintaining a list of clients who ow...
-
Chapter and Conference Paper
Efficient Sanitizable Signatures Without Random Oracles
Sanitizable signatures, introduced by Ateniese et al. (ESORICS ’05), allow the signer to delegate the sanitization right of signed messages. The sanitizer can modify the message and update the signature accord...
-
Chapter and Conference Paper
Stiffness Control of Soft Robotic Manipulator for Minimally Invasive Surgery (MIS) Using Scale Jamming
Continuum and soft robotics showed many applications in medicine from surgery to health care where their compliant nature is advantageous in minimal invasive interaction with organs. Stiffness control is neces...
-
Chapter and Conference Paper
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator
Attribute-Based Encryption (ABE) offers fine-grained decryption policy such that users can do decryption if their attributes satisfy the policy. Such flexibility enables it applicable in various applications i...
-
Chapter and Conference Paper
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model
A popular methodology of designing cryptosystems with practical efficiency is to give a security proof in the random oracle (RO) model. The work of Fischlin and Fleischhacker (Eurocrypt ’13) investigated the c...
-
Chapter and Conference Paper
Trajectory Adaptation and Learning for Ankle Rehabilitation Using a 3-PRS Parallel Robot
This paper presents a methodology for learning and adaptation of a 3-PRS parallel robot skills for ankle rehabilitation. Passive exercises have been designed to train dorsi/plantar flexion, inversion/eversion ...
-
Chapter and Conference Paper
Opponent Modeling for Virtual Human Negotiators
Negotiation is a challenging domain for virtual human research. One aspect of this problem, known as opponent modeling, is discovering what the other party wants from the negotiation. Research in automated negoti...
-
Chapter and Conference Paper
Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks
In this paper, we investigate user selection algorithms for massive MIMO downlink wireless channel using secrecy rates. Massive MIMO is new disruptive wireless communication technology that exploits the benefi...
-
Chapter and Conference Paper
Untangling Operator Monitoring Approaches When Designing Intelligent Adaptive Systems for Operational Environments
An Intelligent Adaptive System (IAS) is a synergy between an intelligent interface and adaptive automation technologies capable of context sensitive interaction with operators. A well-designed IAS should enabl...