Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Computational Thinking (CT) Problem Solving Orientation Based on Logic-Decomposition-Abstraction (LDA) by Rural Elementary School Children Using Visual-Based Presentations

    This qualitative and ethnographic study examines how interactions embedded in the Collaborative Computational Thinking Design Practices (CCTDP) framework, has helped rural children think to solve STEM related ...

    Halimah Badioze Zaman, Azlina Ahmad, Aliimran Nordin in Advances in Visual Informatics (2019)

  2. No Access

    Chapter and Conference Paper

    Position: GDPR Compliance by Construction

    New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...

    Malte Schwarzkopf, Eddie Kohler in Heterogeneous Data Management, Polystores,… (2019)

  3. No Access

    Chapter and Conference Paper

    Trends and Opportunities for Traffic Engineering Paradigms Across Mobile Cellular Network Generations

    Traffic engineering is at the heart of telecommunications engineering. In telecommunication engineering, we have recently experienced a revolution in the form of mobile cellular network generations. History sh...

    Khadija Mkocha, Mussa M. Kissaka in Information and Communication Technologies… (2019)

  4. No Access

    Chapter and Conference Paper

    Structure-Preserving Certificateless Encryption and Its Application

    Certificateless encryption (CLE) combines the advantages of public-key encryption (PKE) and identity-based encryption (IBE) by removing the certificate management of PKE and the key escrow problem of IBE. In t...

    Tao Zhang, Huangting Wu, Sherman S. M. Chow in Topics in Cryptology – CT-RSA 2019 (2019)

  5. No Access

    Chapter and Conference Paper

    Hardware Assisted Randomization of Data

    Data-oriented attacks are gaining traction thanks to advances in code-centric mitigation techniques for memory corruption vulnerabilities. Previous work on mitigating data-oriented attacks includes Data Space ...

    Brian Belleville, Hyungon Moon in Research in Attacks, Intrusions, and Defen… (2018)

  6. Chapter and Conference Paper

    Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security

    Blockchain is a promising infrastructural technology that is finding its way into a growing number of domains like big data, finance, and medical. While blockchain has come to be thought of primarily as the f...

    Reza M. Parizi, Amritraj, Ali Dehghantanha in Blockchain – ICBC 2018 (2018)

  7. No Access

    Chapter and Conference Paper

    Distributed Time-Memory Tradeoff Attacks on Ciphers

    In this paper, we consider the implications of parallelizing time-memory tradeoff attacks using a large number of distributed processors. It is shown that Hellman’s original tradeoff method and the Biryukov-Sh...

    Howard M. Heys in Information Security and Privacy (2018)

  8. Chapter and Conference Paper

    Facilitating Social Harmony Through ICTs

    Social Harmony involves the peaceful interaction of people in a social setting. In this keynote address I briefly examine the historical antecedents of social harmony and identify some of the salient barriers ...

    Robert M. Davison in Information and Communication Technologies for Development (2017)

  9. No Access

    Chapter and Conference Paper

    Speech Authentication and Recovery Scheme in Encrypted Domain

    This paper proposes a self-embedding fragile watermarking scheme in encrypted speech based on hyper-chaotic system and reference sharing mechanism. Hyper-chaotic system is introduced to hide the feature and im...

    Qing Qian, Hongxia Wang, Sani M. Abdullahi, Huan Wang in Digital Forensics and Watermarking (2017)

  10. Chapter and Conference Paper

    The Planning of Smart City to Mitigate the Impacts of Natural Disaster in North Sumatera

    This article introduces the smart urban planning in the mitigation of natural disasters in urban areas in Indonesia especially North Sumatera. A smart city is a city-based social development, capital, citizen ...

    Dedy Hartama, Herman Mawengkang in Information Technology in Disaster Risk Re… (2017)

  11. No Access

    Chapter and Conference Paper

    Privacy-Preserving Multi-pattern Matching

    Multi-pattern matching compares a large set of patterns against a given query string, which has wide application in various domains such as bio-informatics and intrusion detection. This paper presents a privac...

    Tao Zhang, **uhua Wang in Security and Privacy in Communication Networks (2017)

  12. No Access

    Chapter and Conference Paper

    Towards Proofs of Ownership Beyond Bounded Leakage

    Cloud servers save their storage cost by applying deduplication. Duplicated copies of the same file uploaded by the cloud service clients can be reduced to a single copy by maintaining a list of clients who ow...

    Yongjun Zhao, Sherman S. M. Chow in Provable Security (2016)

  13. Chapter and Conference Paper

    Efficient Sanitizable Signatures Without Random Oracles

    Sanitizable signatures, introduced by Ateniese et al. (ESORICS ’05), allow the signer to delegate the sanitization right of signed messages. The sanitizer can modify the message and update the signature accord...

    Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow in Computer Security – ESORICS 2016 (2016)

  14. No Access

    Chapter and Conference Paper

    Stiffness Control of Soft Robotic Manipulator for Minimally Invasive Surgery (MIS) Using Scale Jamming

    Continuum and soft robotics showed many applications in medicine from surgery to health care where their compliant nature is advantageous in minimal invasive interaction with organs. Stiffness control is neces...

    S. M. Hadi Sadati, Yohan Noh, S. Elnaz Naghibi in Intelligent Robotics and Applications (2015)

  15. Chapter and Conference Paper

    Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator

    Attribute-Based Encryption (ABE) offers fine-grained decryption policy such that users can do decryption if their attributes satisfy the policy. Such flexibility enables it applicable in various applications i...

    Yuechen Chen, Zoe L. Jiang, S. M. Yiu in Information and Communications Security (2015)

  16. No Access

    Chapter and Conference Paper

    Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model

    A popular methodology of designing cryptosystems with practical efficiency is to give a security proof in the random oracle (RO) model. The work of Fischlin and Fleischhacker (Eurocrypt ’13) investigated the c...

    Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka in Provable Security (2015)

  17. No Access

    Chapter and Conference Paper

    Trajectory Adaptation and Learning for Ankle Rehabilitation Using a 3-PRS Parallel Robot

    This paper presents a methodology for learning and adaptation of a 3-PRS parallel robot skills for ankle rehabilitation. Passive exercises have been designed to train dorsi/plantar flexion, inversion/eversion ...

    Fares J. Abu-Dakk, A. Valera, J.A. Escalera in Intelligent Robotics and Applications (2015)

  18. No Access

    Chapter and Conference Paper

    Opponent Modeling for Virtual Human Negotiators

    Negotiation is a challenging domain for virtual human research. One aspect of this problem, known as opponent modeling, is discovering what the other party wants from the negotiation. Research in automated negoti...

    Zahra Nazari, Gale M. Lucas, Jonathan Gratch in Intelligent Virtual Agents (2015)

  19. No Access

    Chapter and Conference Paper

    Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks

    In this paper, we investigate user selection algorithms for massive MIMO downlink wireless channel using secrecy rates. Massive MIMO is new disruptive wireless communication technology that exploits the benefi...

    M. Arif Khan, Rafiqul Islam in Security and Privacy in Communication Networks (2015)

  20. Chapter and Conference Paper

    Untangling Operator Monitoring Approaches When Designing Intelligent Adaptive Systems for Operational Environments

    An Intelligent Adaptive System (IAS) is a synergy between an intelligent interface and adaptive automation technologies capable of context sensitive interaction with operators. A well-designed IAS should enabl...

    Ming Hou, Cali M. Fidopiastis in Foundations of Augmented Cognition. Advanc… (2014)

previous disabled Page of 4